277 lines
13 KiB
JSON
277 lines
13 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20171808",
|
|
"Version": "oval:org.altlinux.errata:def:20171808",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2017-1808: package `kernel-image-ovz-el` update to version 2.6.32-alt154",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2017-1808",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1808",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01200",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01200",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01414",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01414",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01415",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01415",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01416",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01416",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01417",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01417",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01479",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01479",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-1000364",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-8890",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-9074",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9074",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-9075",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9075",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-9076",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9076",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-9077",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9077",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades kernel-image-ovz-el to version 2.6.32-alt154. \nSecurity Fix(es):\n\n * BDU:2017-01200: Уязвимость функции inet_csk_clone_lock службы net/ipv4/inet_connection_sock.c операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-01414: Уязвимость функции tcp_v6_syn_recv_sock службы net/ipv6/tcp_ipv6.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-01415: Уязвимость функции dccp_v6_request_recv_sock службы net/dccp/ipv6.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-01416: Уязвимость функции sctp_v6_create_accept_sk службы net/sctp/ipv6.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-01417: Уязвимость реализации фрагментации пакетов IPv6 в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-01479: Уязвимость в реализации механизма Stack Guard-Page ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be \"jumped\" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).\n\n * CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.\n\n * CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.\n\n * CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.\n\n * CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.\n\n * CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2017-07-04"
|
|
},
|
|
"Updated": {
|
|
"Date": "2017-07-04"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2017-01200",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-415",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01200",
|
|
"Impact": "High",
|
|
"Public": "20170510"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01414",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01414",
|
|
"Impact": "Low",
|
|
"Public": "20170519"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01415",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01415",
|
|
"Impact": "High",
|
|
"Public": "20170519"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01416",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01416",
|
|
"Impact": "High",
|
|
"Public": "20170519"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01417",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01417",
|
|
"Impact": "High",
|
|
"Public": "20170519"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01479",
|
|
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01479",
|
|
"Impact": "High",
|
|
"Public": "20170618"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2017-1000364",
|
|
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364",
|
|
"Impact": "High",
|
|
"Public": "20170619"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-8890",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-415",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890",
|
|
"Impact": "High",
|
|
"Public": "20170510"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-9074",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9074",
|
|
"Impact": "High",
|
|
"Public": "20170519"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-9075",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9075",
|
|
"Impact": "High",
|
|
"Public": "20170519"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-9076",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9076",
|
|
"Impact": "High",
|
|
"Public": "20170519"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-9077",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9077",
|
|
"Impact": "High",
|
|
"Public": "20170519"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808001",
|
|
"Comment": "kernel-headers-modules-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808002",
|
|
"Comment": "kernel-headers-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808003",
|
|
"Comment": "kernel-image-domU-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808004",
|
|
"Comment": "kernel-image-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808005",
|
|
"Comment": "kernel-modules-alsa-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808006",
|
|
"Comment": "kernel-modules-drm-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808007",
|
|
"Comment": "kernel-modules-ide-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808008",
|
|
"Comment": "kernel-modules-kvm-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808009",
|
|
"Comment": "kernel-modules-staging-ovz-el is earlier than 0:2.6.32-alt154"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171808010",
|
|
"Comment": "kernel-modules-v4l-ovz-el is earlier than 0:2.6.32-alt154"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |