2024-12-12 21:07:30 +00:00

104 lines
4.1 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20241865",
"Version": "oval:org.altlinux.errata:def:20241865",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-1865: package `kernel-image-mp` update to version 6.6.16-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-1865",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-1865",
"Source": "ALTPU"
},
{
"RefID": "CVE-2024-1085",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1085",
"Source": "CVE"
},
{
"RefID": "CVE-2024-1086",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1086",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 6.6.16-alt1. \nSecurity Fix(es):\n\n * CVE-2024-1085: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.\n\nWe recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.\n\n\n\n * CVE-2024-1086: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.\n\n",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-02-06"
},
"Updated": {
"Date": "2024-02-06"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2024-1085",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1085",
"Impact": "High",
"Public": "20240131"
},
{
"ID": "CVE-2024-1086",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1086",
"Impact": "High",
"Public": "20240131"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20241865001",
"Comment": "kernel-headers-modules-mp is earlier than 0:6.6.16-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20241865002",
"Comment": "kernel-headers-mp is earlier than 0:6.6.16-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20241865003",
"Comment": "kernel-image-mp is earlier than 0:6.6.16-alt1"
}
]
}
]
}
}
]
}