vuln-list-alt/oval/p11/ALT-PU-2021-3331/definitions.json
2024-12-12 21:07:30 +00:00

189 lines
8.2 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213331",
"Version": "oval:org.altlinux.errata:def:20213331",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3331: package `kernel-image-un-def` update to version 5.14.21-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3331",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3331",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-04806",
"RefURL": "https://bdu.fstec.ru/vul/2021-04806",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05472",
"RefURL": "https://bdu.fstec.ru/vul/2021-05472",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05780",
"RefURL": "https://bdu.fstec.ru/vul/2022-05780",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3736",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3739",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3739",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3764",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 5.14.21-alt1. \nSecurity Fix(es):\n\n * BDU:2021-04806: Уязвимость функции ccp_run_aes_gcm_cmd() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05472: Уязвимость функции mbochs_ioctl файла samples / vfio-mdev / mbochs.c ядра операционных систем семейства Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2022-05780: Уязвимость функции btrfs_rm_device компонента fs/btrfs/volumes.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * CVE-2021-3736: A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information.\n\n * CVE-2021-3739: A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires CAP_SYS_ADMIN. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3764: A memory leak flaw was found in the Linux kernel's ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-11-22"
},
"Updated": {
"Date": "2021-11-22"
},
"BDUs": [
{
"ID": "BDU:2021-04806",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2021-04806",
"Impact": "Low",
"Public": "20210924"
},
{
"ID": "BDU:2021-05472",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2021-05472",
"Impact": "Low",
"Public": "20210811"
},
{
"ID": "BDU:2022-05780",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-05780",
"Impact": "High",
"Public": "20210823"
}
],
"CVEs": [
{
"ID": "CVE-2021-3736",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3736",
"Impact": "Low",
"Public": "20220823"
},
{
"ID": "CVE-2021-3739",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3739",
"Impact": "High",
"Public": "20220310"
},
{
"ID": "CVE-2021-3764",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"Impact": "Low",
"Public": "20220823"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213331001",
"Comment": "kernel-doc-un is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331003",
"Comment": "kernel-headers-un-def is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331004",
"Comment": "kernel-image-domU-un-def is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331005",
"Comment": "kernel-image-un-def is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331006",
"Comment": "kernel-image-un-def-checkinstall is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331007",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331008",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.14.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213331010",
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.14.21-alt1"
}
]
}
]
}
}
]
}