vuln-list-alt/oval/c9f2/ALT-PU-2017-1215/definitions.json
2024-06-28 13:17:52 +00:00

229 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171215",
"Version": "oval:org.altlinux.errata:def:20171215",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1215: package `kernel-image-un-def` update to version 4.9.13-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1215",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1215",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01556",
"RefURL": "https://bdu.fstec.ru/vul/2017-01556",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00379",
"RefURL": "https://bdu.fstec.ru/vul/2018-00379",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06413",
"RefURL": "https://bdu.fstec.ru/vul/2021-06413",
"Source": "BDU"
},
{
"RefID": "CVE-2017-6074",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6074",
"Source": "CVE"
},
{
"RefID": "CVE-2017-6345",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6345",
"Source": "CVE"
},
{
"RefID": "CVE-2017-6346",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6346",
"Source": "CVE"
},
{
"RefID": "CVE-2017-6347",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6347",
"Source": "CVE"
},
{
"RefID": "CVE-2017-6348",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6348",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.9.13-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01556: Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегии суперпользователя\n\n * BDU:2018-00379: Уязвимость функции ip_cmsg_recv_checksum (net/ipv4/ip_sockglue.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06413: Уязвимость подсистемы LLC ядра операционной системы Linux, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.\n\n * CVE-2017-6345: The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.\n\n * CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.\n\n * CVE-2017-6347: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission.\n\n * CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-02-27"
},
"Updated": {
"Date": "2017-02-27"
},
"BDUs": [
{
"ID": "BDU:2017-01556",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2017-01556",
"Impact": "High",
"Public": "20170217"
},
{
"ID": "BDU:2018-00379",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2018-00379",
"Impact": "High",
"Public": "20170221"
},
{
"ID": "BDU:2021-06413",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-06413",
"Impact": "High",
"Public": "20170212"
}
],
"CVEs": [
{
"ID": "CVE-2017-6074",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6074",
"Impact": "High",
"Public": "20170218"
},
{
"ID": "CVE-2017-6345",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6345",
"Impact": "High",
"Public": "20170301"
},
{
"ID": "CVE-2017-6346",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6346",
"Impact": "High",
"Public": "20170301"
},
{
"ID": "CVE-2017-6347",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6347",
"Impact": "High",
"Public": "20170301"
},
{
"ID": "CVE-2017-6348",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6348",
"Impact": "Low",
"Public": "20170301"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171215001",
"Comment": "kernel-doc-un is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215003",
"Comment": "kernel-headers-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215005",
"Comment": "kernel-image-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215006",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215007",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215008",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215009",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215010",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.9.13-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171215012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.9.13-alt1"
}
]
}
]
}
}
]
}