2024-06-28 13:17:52 +00:00

221 lines
9.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20203069",
"Version": "oval:org.altlinux.errata:def:20203069",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-3069: package `kernel-image-mp` update to version 5.8.16-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-3069",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3069",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-04797",
"RefURL": "https://bdu.fstec.ru/vul/2020-04797",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05386",
"RefURL": "https://bdu.fstec.ru/vul/2020-05386",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05701",
"RefURL": "https://bdu.fstec.ru/vul/2020-05701",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00284",
"RefURL": "https://bdu.fstec.ru/vul/2021-00284",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06412",
"RefURL": "https://bdu.fstec.ru/vul/2021-06412",
"Source": "BDU"
},
{
"RefID": "CVE-2020-12351",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25641",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
"Source": "CVE"
},
{
"RefID": "CVE-2020-26541",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27194",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27194",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28915",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28915",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.8.16-alt1. \nSecurity Fix(es):\n\n * BDU:2020-04797: Уязвимость компонента net/bluetooth/l2cap_core.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2020-05386: Уязвимость функции scalar32_min_max_or (kernel/bpf/verifier.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05701: Уязвимость функции iov_iter_copy_from_user_atomic () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00284: Уязвимость ядра операционной системы Linux, связанная с некорректной проверкой криптографической подписи, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-06412: Уязвимость ядра операционной системы Linux, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-12351: Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.\n\n * CVE-2020-25641: A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n * CVE-2020-26541: The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.\n\n * CVE-2020-27194: An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.\n\n * CVE-2020-28915: A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-10-19"
},
"Updated": {
"Date": "2020-10-19"
},
"BDUs": [
{
"ID": "BDU:2020-04797",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-04797",
"Impact": "High",
"Public": "20200925"
},
{
"ID": "BDU:2020-05386",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-681",
"Href": "https://bdu.fstec.ru/vul/2020-05386",
"Impact": "Low",
"Public": "20201008"
},
{
"ID": "BDU:2020-05701",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2020-05701",
"Impact": "Low",
"Public": "20200902"
},
{
"ID": "BDU:2021-00284",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-200, CWE-347",
"Href": "https://bdu.fstec.ru/vul/2021-00284",
"Impact": "Low",
"Public": "20201001"
},
{
"ID": "BDU:2021-06412",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-06412",
"Impact": "Low",
"Public": "20200925"
}
],
"CVEs": [
{
"ID": "CVE-2020-12351",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351",
"Impact": "High",
"Public": "20201123"
},
{
"ID": "CVE-2020-25641",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
"Impact": "Low",
"Public": "20201006"
},
{
"ID": "CVE-2020-26541",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"Impact": "Low",
"Public": "20201002"
},
{
"ID": "CVE-2020-27194",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-681",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27194",
"Impact": "Low",
"Public": "20201016"
},
{
"ID": "CVE-2020-28915",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28915",
"Impact": "Low",
"Public": "20201118"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20203069001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.8.16-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203069002",
"Comment": "kernel-headers-mp is earlier than 0:5.8.16-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203069003",
"Comment": "kernel-image-mp is earlier than 0:5.8.16-alt1"
}
]
}
]
}
}
]
}