2024-12-12 21:07:30 +00:00

285 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161331",
"Version": "oval:org.altlinux.errata:def:20161331",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1331: package `kernel-image-un-def` update to version 4.5.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1331",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1331",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-02241",
"RefURL": "https://bdu.fstec.ru/vul/2016-02241",
"Source": "BDU"
},
{
"RefID": "CVE-2016-2184",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2184",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2185",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2185",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2186",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2186",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2188",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2188",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3136",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3136",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3137",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3137",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3138",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3138",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3140",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3140",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3689",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3689",
"Source": "CVE"
},
{
"RefID": "CVE-2016-6327",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6327",
"Source": "CVE"
},
{
"RefID": "CVE-2016-9685",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9685",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.5.1-alt1. \nSecurity Fix(es):\n\n * BDU:2016-02241: Уязвимость функции iowarrior_probe ядра операционной системы Linux, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.\n\n * CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.\n\n * CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.\n\n * CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.\n\n * CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.\n\n * CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-04-13"
},
"Updated": {
"Date": "2016-04-13"
},
"BDUs": [
{
"ID": "BDU:2016-02241",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2016-02241",
"Impact": "Low",
"Public": "20160318"
}
],
"CVEs": [
{
"ID": "CVE-2016-2184",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2184",
"Impact": "Low",
"Public": "20160427"
},
{
"ID": "CVE-2016-2185",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2185",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2016-2186",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2186",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2016-2188",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2188",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2016-3136",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3136",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2016-3137",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3137",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2016-3138",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3138",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2016-3140",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3140",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2016-3689",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3689",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2016-6327",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6327",
"Impact": "Low",
"Public": "20161016"
},
{
"ID": "CVE-2016-9685",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9685",
"Impact": "Low",
"Public": "20161228"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161331001",
"Comment": "kernel-doc-un is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331003",
"Comment": "kernel-headers-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331005",
"Comment": "kernel-image-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331006",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331007",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331008",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331009",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331010",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.5.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161331012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.5.1-alt1"
}
]
}
]
}
}
]
}