2024-06-28 13:17:52 +00:00

191 lines
8.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20181943",
"Version": "oval:org.altlinux.errata:def:20181943",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-1943: package `kernel-image-un-def` update to version 4.16.18-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-1943",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1943",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02397",
"RefURL": "https://bdu.fstec.ru/vul/2019-02397",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01420",
"RefURL": "https://bdu.fstec.ru/vul/2021-01420",
"Source": "BDU"
},
{
"RefID": "CVE-2018-10840",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10840",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1118",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118",
"Source": "CVE"
},
{
"RefID": "CVE-2018-11412",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-11412",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.16.18-alt1. \nSecurity Fix(es):\n\n * BDU:2019-02397: Уязвимость функции ext4_xattr_set_entry ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями или вызвать отказ в обслуживании\n\n * BDU:2021-01420: Уязвимость функции vhost_new_msg() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * CVE-2018-10840: Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image.\n\n * CVE-2018-1118: Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.\n\n * CVE-2018-11412: In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-06-27"
},
"Updated": {
"Date": "2018-06-27"
},
"BDUs": [
{
"ID": "BDU:2019-02397",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-121, CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-02397",
"Impact": "Low",
"Public": "20180523"
},
{
"ID": "BDU:2021-01420",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-665",
"Href": "https://bdu.fstec.ru/vul/2021-01420",
"Impact": "Low",
"Public": "20180509"
}
],
"CVEs": [
{
"ID": "CVE-2018-10840",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10840",
"Impact": "Low",
"Public": "20180716"
},
{
"ID": "CVE-2018-1118",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118",
"Impact": "Low",
"Public": "20180510"
},
{
"ID": "CVE-2018-11412",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-11412",
"Impact": "Low",
"Public": "20180524"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20181943001",
"Comment": "kernel-doc-un is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943003",
"Comment": "kernel-headers-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943005",
"Comment": "kernel-image-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943011",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943012",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.16.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181943013",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.16.18-alt1"
}
]
}
]
}
}
]
}