vuln-list-alt/oval/c9f2/ALT-PU-2014-1605/definitions.json
2024-12-12 21:07:30 +00:00

364 lines
17 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20141605",
"Version": "oval:org.altlinux.errata:def:20141605",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2014-1605: package `kernel-image-led-vs` update to version 3.13.11-alt12",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2014-1605",
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-1605",
"Source": "ALTPU"
},
{
"RefID": "BDU:2014-00052",
"RefURL": "https://bdu.fstec.ru/vul/2014-00052",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00053",
"RefURL": "https://bdu.fstec.ru/vul/2014-00053",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00060",
"RefURL": "https://bdu.fstec.ru/vul/2014-00060",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00110",
"RefURL": "https://bdu.fstec.ru/vul/2014-00110",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00111",
"RefURL": "https://bdu.fstec.ru/vul/2014-00111",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00334",
"RefURL": "https://bdu.fstec.ru/vul/2014-00334",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00336",
"RefURL": "https://bdu.fstec.ru/vul/2014-00336",
"Source": "BDU"
},
{
"RefID": "BDU:2015-04307",
"RefURL": "https://bdu.fstec.ru/vul/2015-04307",
"Source": "BDU"
},
{
"RefID": "BDU:2015-04308",
"RefURL": "https://bdu.fstec.ru/vul/2015-04308",
"Source": "BDU"
},
{
"RefID": "BDU:2015-04309",
"RefURL": "https://bdu.fstec.ru/vul/2015-04309",
"Source": "BDU"
},
{
"RefID": "BDU:2015-04310",
"RefURL": "https://bdu.fstec.ru/vul/2015-04310",
"Source": "BDU"
},
{
"RefID": "CVE-2014-1737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1737",
"Source": "CVE"
},
{
"RefID": "CVE-2014-1738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1738",
"Source": "CVE"
},
{
"RefID": "CVE-2014-3122",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3122",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-led-vs to version 3.13.11-alt12. \nSecurity Fix(es):\n\n * BDU:2014-00052: Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к защищаемой информации\n\n * BDU:2014-00053: Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к защищаемой информации\n\n * BDU:2014-00060: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2014-00110: Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии\n\n * BDU:2014-00111: Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии\n\n * BDU:2014-00334: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2014-00336: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2015-04307: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04308: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04309: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04310: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2014-1737: The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.\n\n * CVE-2014-1738: The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.\n\n * CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2014-05-09"
},
"Updated": {
"Date": "2014-05-09"
},
"BDUs": [
{
"ID": "BDU:2014-00052",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2014-00052",
"Impact": "Low",
"Public": "20140717"
},
{
"ID": "BDU:2014-00053",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2014-00053",
"Impact": "High",
"Public": "20140511"
},
{
"ID": "BDU:2014-00060",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2014-00060",
"Impact": "Low",
"Public": "20140511"
},
{
"ID": "BDU:2014-00110",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2014-00110",
"Impact": "High",
"Public": "20140511"
},
{
"ID": "BDU:2014-00111",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2014-00111",
"Impact": "Low",
"Public": "20140511"
},
{
"ID": "BDU:2014-00334",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2014-00334",
"Impact": "High",
"Public": "20140511"
},
{
"ID": "BDU:2014-00336",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2014-00336",
"Impact": "Low",
"Public": "20140511"
},
{
"ID": "BDU:2015-04307",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-04307",
"Impact": "Critical",
"Public": "20130122"
},
{
"ID": "BDU:2015-04308",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-04308",
"Impact": "Critical"
},
{
"ID": "BDU:2015-04309",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-04309",
"Impact": "Critical"
},
{
"ID": "BDU:2015-04310",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-04310",
"Impact": "Critical"
}
],
"CVEs": [
{
"ID": "CVE-2014-1737",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1737",
"Impact": "High",
"Public": "20140511"
},
{
"ID": "CVE-2014-1738",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1738",
"Impact": "Low",
"Public": "20140511"
},
{
"ID": "CVE-2014-3122",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3122",
"Impact": "Low",
"Public": "20140511"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20141605001",
"Comment": "firmware-kernel-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605002",
"Comment": "kernel-doc-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605003",
"Comment": "kernel-docbook-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605004",
"Comment": "kernel-headers-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605005",
"Comment": "kernel-headers-modules-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605006",
"Comment": "kernel-image-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605007",
"Comment": "kernel-man-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605008",
"Comment": "kernel-modules-drm-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605009",
"Comment": "kernel-modules-edac-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605010",
"Comment": "kernel-modules-fglrx-led-vs is earlier than 0:14.10.1006_3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605011",
"Comment": "kernel-modules-fs-extra-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605012",
"Comment": "kernel-modules-guest-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605013",
"Comment": "kernel-modules-ide-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605014",
"Comment": "kernel-modules-infiniband-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605015",
"Comment": "kernel-modules-input-extra-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605016",
"Comment": "kernel-modules-ipmi-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605017",
"Comment": "kernel-modules-kvm-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605018",
"Comment": "kernel-modules-media-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605019",
"Comment": "kernel-modules-mtd-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605020",
"Comment": "kernel-modules-net-extra-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605021",
"Comment": "kernel-modules-oprofile-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605022",
"Comment": "kernel-modules-scsi-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605023",
"Comment": "kernel-modules-sound-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605024",
"Comment": "kernel-modules-usb-gadget-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605025",
"Comment": "kernel-modules-vboxguest-led-vs is earlier than 0:4.3.10_3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605026",
"Comment": "kernel-modules-vboxhost-led-vs is earlier than 0:4.3.10_3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605027",
"Comment": "kernel-modules-video-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605028",
"Comment": "kernel-modules-watchdog-led-vs is earlier than 0:3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605029",
"Comment": "kernel-modules-zfs-led-vs is earlier than 0:0.6.2_3.13.11-alt12"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141605030",
"Comment": "kernel-src-led-vs is earlier than 0:3.13.11-alt12"
}
]
}
]
}
}
]
}