246 lines
12 KiB
JSON
246 lines
12 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20142106",
|
|
"Version": "oval:org.altlinux.errata:def:20142106",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2014-2106: package `kernel-image-un-def` update to version 3.16.2-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2014-2106",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-2106",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3182",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3182",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3183",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3183",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3184",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3184",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3185",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3185",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3601",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3601",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4323",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4323",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-5206",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5206",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-5207",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5207",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-5471",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5471",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-5472",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5472",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades kernel-image-un-def to version 3.16.2-alt1. \nSecurity Fix(es):\n\n * CVE-2014-3182: Array index error in the logi_dj_raw_event function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to execute arbitrary code or cause a denial of service (invalid kfree) via a crafted device that provides a malformed REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value.\n\n * CVE-2014-3183: Heap-based buffer overflow in the logi_dj_ll_raw_request function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that specifies a large report size for an LED report.\n\n * CVE-2014-3184: The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.\n\n * CVE-2014-3185: Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.\n\n * CVE-2014-3601: The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.\n\n * CVE-2014-4323: The mdp_lut_hw_update function in drivers/video/msm/mdp.c in the MDP display driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain start and length values within an ioctl call, which allows attackers to gain privileges via a crafted application.\n\n * CVE-2014-5206: The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a \"mount -o remount\" command within a user namespace.\n\n * CVE-2014-5207: fs/namespace.c in the Linux kernel through 3.16.1 does not properly restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing MNT_ATIME_MASK during a remount of a bind mount, which allows local users to gain privileges, interfere with backups and auditing on systems that had atime enabled, or cause a denial of service (excessive filesystem updating) on systems that had atime disabled via a \"mount -o remount\" command within a user namespace.\n\n * CVE-2014-5471: Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.\n\n * CVE-2014-5472: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2014-09-09"
|
|
},
|
|
"Updated": {
|
|
"Date": "2014-09-09"
|
|
},
|
|
"BDUs": null,
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2014-3182",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3182",
|
|
"Impact": "Low",
|
|
"Public": "20140928"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3183",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3183",
|
|
"Impact": "Low",
|
|
"Public": "20140928"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3184",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3184",
|
|
"Impact": "Low",
|
|
"Public": "20140928"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3185",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3185",
|
|
"Impact": "Low",
|
|
"Public": "20140928"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3601",
|
|
"CVSS": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3601",
|
|
"Impact": "Low",
|
|
"Public": "20140901"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4323",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4323",
|
|
"Impact": "High",
|
|
"Public": "20141212"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-5206",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5206",
|
|
"Impact": "High",
|
|
"Public": "20140818"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-5207",
|
|
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5207",
|
|
"Impact": "Low",
|
|
"Public": "20140818"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-5471",
|
|
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5471",
|
|
"Impact": "Low",
|
|
"Public": "20140901"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-5472",
|
|
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5472",
|
|
"Impact": "Low",
|
|
"Public": "20140901"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106001",
|
|
"Comment": "kernel-doc-un is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106002",
|
|
"Comment": "kernel-headers-modules-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106003",
|
|
"Comment": "kernel-headers-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106004",
|
|
"Comment": "kernel-image-domU-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106005",
|
|
"Comment": "kernel-image-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106006",
|
|
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106007",
|
|
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106008",
|
|
"Comment": "kernel-modules-drm-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106009",
|
|
"Comment": "kernel-modules-ide-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106010",
|
|
"Comment": "kernel-modules-kvm-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106011",
|
|
"Comment": "kernel-modules-staging-un-def is earlier than 1:3.16.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142106012",
|
|
"Comment": "kernel-modules-v4l-un-def is earlier than 1:3.16.2-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |