358 lines
18 KiB
JSON
358 lines
18 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20191767",
|
|
"Version": "oval:org.altlinux.errata:def:20191767",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2019-1767: package `kernel-image-un-def` update to version 5.0.12-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2019-1767",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1767",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-02763",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-02763",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-02778",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-02778",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-03094",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-03094",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-03629",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-03629",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-04515",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-04515",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-01342",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-01342",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-01463",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-01463",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-02259",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-02259",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-11487",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11487",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-11599",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11599",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15214",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15214",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15918",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15918",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15919",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15919",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15920",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15920",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15924",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15924",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-18805",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-3882",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades kernel-image-un-def to version 5.0.12-alt1. \nSecurity Fix(es):\n\n * BDU:2019-02763: Уязвимость в файлах fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, mm/hugetlb.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-02778: Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании и получить конфиденциальную информацию\n\n * BDU:2019-03094: Уязвимость компонентов sound/core/init.c и sound/core/info.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03629: Уязвимость драйвера vfio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04515: Уязвимость функции dwc3_pci_probe() (drivers/usb/dwc3/dwc3-pci.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01342: Уязвимость функции SMB2_negotiate (fs/cifs/smb2pdu.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01463: Уязвимость функции SMB2_read ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02259: Уязвимость функции SMB2_write (fs/cifs/smb2pdu.c) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2019-11487: The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.\n\n * CVE-2019-11599: The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.\n\n * CVE-2019-15214: An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.\n\n * CVE-2019-15918: An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21.\n\n * CVE-2019-15919: An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.\n\n * CVE-2019-15920: An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak.\n\n * CVE-2019-15924: An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.\n\n * CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.\n\n * CVE-2019-3882: A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2019-05-05"
|
|
},
|
|
"Updated": {
|
|
"Date": "2019-05-05"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2019-02763",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-02763",
|
|
"Impact": "High",
|
|
"Public": "20190411"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-02778",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-362, CWE-667",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-02778",
|
|
"Impact": "High",
|
|
"Public": "20190419"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-03094",
|
|
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-03094",
|
|
"Impact": "Low",
|
|
"Public": "20190416"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-03629",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-400, CWE-770",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-03629",
|
|
"Impact": "Low",
|
|
"Public": "20190403"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-04515",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-04515",
|
|
"Impact": "Critical",
|
|
"Public": "20190417"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-01342",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-01342",
|
|
"Impact": "High",
|
|
"Public": "20190416"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-01463",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-01463",
|
|
"Impact": "Low",
|
|
"Public": "20190416"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-02259",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-02259",
|
|
"Impact": "Low",
|
|
"Public": "20190416"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2019-11487",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11487",
|
|
"Impact": "High",
|
|
"Public": "20190423"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-11599",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-667",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11599",
|
|
"Impact": "High",
|
|
"Public": "20190429"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15214",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15214",
|
|
"Impact": "Low",
|
|
"Public": "20190819"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15918",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15918",
|
|
"Impact": "High",
|
|
"Public": "20190904"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15919",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15919",
|
|
"Impact": "Low",
|
|
"Public": "20190904"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15920",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15920",
|
|
"Impact": "Low",
|
|
"Public": "20190904"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15924",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15924",
|
|
"Impact": "Low",
|
|
"Public": "20190904"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-18805",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805",
|
|
"Impact": "Critical",
|
|
"Public": "20191107"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-3882",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882",
|
|
"Impact": "Low",
|
|
"Public": "20190424"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767001",
|
|
"Comment": "kernel-doc-un is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767002",
|
|
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767003",
|
|
"Comment": "kernel-headers-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767004",
|
|
"Comment": "kernel-image-domU-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767005",
|
|
"Comment": "kernel-image-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767006",
|
|
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767007",
|
|
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767008",
|
|
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767009",
|
|
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767010",
|
|
"Comment": "kernel-modules-ide-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767011",
|
|
"Comment": "kernel-modules-kvm-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767012",
|
|
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.0.12-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20191767013",
|
|
"Comment": "kernel-modules-v4l-un-def is earlier than 1:5.0.12-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |