vuln-list-alt/oval/c10f1/ALT-PU-2021-3309/definitions.json
2024-06-28 13:17:52 +00:00

185 lines
7.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213309",
"Version": "oval:org.altlinux.errata:def:20213309",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3309: package `kernel-image-std-def` update to version 5.10.79-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3309",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3309",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-05673",
"RefURL": "https://bdu.fstec.ru/vul/2021-05673",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05646",
"RefURL": "https://bdu.fstec.ru/vul/2022-05646",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3760",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3760",
"Source": "CVE"
},
{
"RefID": "CVE-2021-43267",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43267",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-def to version 5.10.79-alt1. \nSecurity Fix(es):\n\n * BDU:2021-05673: Уязвимость реализации функции tipc_crypto_key_rcv() протокола для внутрикластерного взаимодействия Transparent Inter-Process Communication (TIPC) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-05646: Уязвимость интерфейса контроллера NFC (NCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2021-3760: A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.\n\n * CVE-2021-43267: An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.\n\n * #40718: Проблема с доступом к NVMe при загрузке на плате TF307-MB-S-D с прошивкой SDK5.2 и 5.3\n\n * #41283: kernel.userns_restrict regression",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-11-20"
},
"Updated": {
"Date": "2021-11-20"
},
"BDUs": [
{
"ID": "BDU:2021-05673",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-1284",
"Href": "https://bdu.fstec.ru/vul/2021-05673",
"Impact": "Critical",
"Public": "20211026"
},
{
"ID": "BDU:2022-05646",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05646",
"Impact": "High",
"Public": "20211008"
}
],
"CVEs": [
{
"ID": "CVE-2021-3760",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3760",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "CVE-2021-43267",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-1284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43267",
"Impact": "Critical",
"Public": "20211102"
}
],
"Bugzilla": [
{
"ID": "40718",
"Href": "https://bugzilla.altlinux.org/40718",
"Data": "Проблема с доступом к NVMe при загрузке на плате TF307-MB-S-D с прошивкой SDK5.2 и 5.3"
},
{
"ID": "41283",
"Href": "https://bugzilla.altlinux.org/41283",
"Data": "kernel.userns_restrict regression"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213309001",
"Comment": "kernel-doc-std is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309002",
"Comment": "kernel-headers-modules-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309003",
"Comment": "kernel-headers-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309004",
"Comment": "kernel-image-domU-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309005",
"Comment": "kernel-image-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309006",
"Comment": "kernel-image-std-def-checkinstall is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309007",
"Comment": "kernel-modules-drm-ancient-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309008",
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309009",
"Comment": "kernel-modules-drm-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309010",
"Comment": "kernel-modules-ide-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309011",
"Comment": "kernel-modules-midgard-be-m1000-std-def is earlier than 2:5.10.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213309012",
"Comment": "kernel-modules-staging-std-def is earlier than 2:5.10.79-alt1"
}
]
}
]
}
}
]
}