179 lines
8.4 KiB
JSON
179 lines
8.4 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20182521",
|
|
"Version": "oval:org.altlinux.errata:def:20182521",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2018-2521: package `xen` update to version 4.10.1-alt6",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2018-2521",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2521",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-04100",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-04100",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-00048",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-00048",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-15118",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15118",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-15119",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15119",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-8897",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades xen to version 4.10.1-alt6. \nSecurity Fix(es):\n\n * BDU:2019-04100: Уязвимость сервера Network Block Device (NBD) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00048: Уязвимость ядра операционных систем Linux, Windows, Ubuntu, Debian GNU/Linux, Red Hat Enterprise Linux, macOS, EulerOS, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2017-15118: A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.\n\n * CVE-2017-15119: The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.\n\n * CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2018-10-20"
|
|
},
|
|
"Updated": {
|
|
"Date": "2018-10-20"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2019-04100",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-400",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-04100",
|
|
"Impact": "High",
|
|
"Public": "20180727"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-00048",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-362, CWE-703",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-00048",
|
|
"Impact": "High",
|
|
"Public": "20180508"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2017-15118",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15118",
|
|
"Impact": "Critical",
|
|
"Public": "20180727"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-15119",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-400",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15119",
|
|
"Impact": "High",
|
|
"Public": "20180727"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-8897",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897",
|
|
"Impact": "High",
|
|
"Public": "20180508"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521001",
|
|
"Comment": "libxen is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521002",
|
|
"Comment": "libxen-devel is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521003",
|
|
"Comment": "xen is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521004",
|
|
"Comment": "xen-doc is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521005",
|
|
"Comment": "xen-hypervisor is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521006",
|
|
"Comment": "xen-licenses is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521007",
|
|
"Comment": "xen-ocaml is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521008",
|
|
"Comment": "xen-ocaml-devel is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521009",
|
|
"Comment": "xen-runtime is earlier than 0:4.10.1-alt6"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182521010",
|
|
"Comment": "xen-stubdoms is earlier than 0:4.10.1-alt6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |