vuln-list-alt/oval/p11/ALT-PU-2017-1781/definitions.json
2024-12-12 21:07:30 +00:00

143 lines
5.3 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171781",
"Version": "oval:org.altlinux.errata:def:20171781",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1781: package `kernel-image-std-def` update to version 4.9.34-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1781",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1781",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01612",
"RefURL": "https://bdu.fstec.ru/vul/2017-01612",
"Source": "BDU"
},
{
"RefID": "CVE-2017-1000379",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-def to version 4.9.34-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01612: Уязвимость ядра операционной системы Linux, позволяющая нарушителю манипулировать стеком\n\n * CVE-2017-1000379: The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-06-26"
},
"Updated": {
"Date": "2017-06-26"
},
"BDUs": [
{
"ID": "BDU:2017-01612",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2017-01612",
"Impact": "High",
"Public": "20170618"
}
],
"CVEs": [
{
"ID": "CVE-2017-1000379",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379",
"Impact": "High",
"Public": "20170619"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171781001",
"Comment": "kernel-doc-std is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781002",
"Comment": "kernel-headers-modules-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781003",
"Comment": "kernel-headers-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781004",
"Comment": "kernel-image-domU-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781005",
"Comment": "kernel-image-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781006",
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781007",
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781008",
"Comment": "kernel-modules-drm-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781009",
"Comment": "kernel-modules-ide-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781010",
"Comment": "kernel-modules-kvm-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781011",
"Comment": "kernel-modules-staging-std-def is earlier than 1:4.9.34-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171781012",
"Comment": "kernel-modules-v4l-std-def is earlier than 1:4.9.34-alt1"
}
]
}
]
}
}
]
}