vuln-list-alt/oval/c9f2/ALT-PU-2015-1018/definitions.json
2024-06-28 13:17:52 +00:00

260 lines
12 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20151018",
"Version": "oval:org.altlinux.errata:def:20151018",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-1018: package `kernel-image-un-def` update to version 3.18.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-1018",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1018",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-09846",
"RefURL": "https://bdu.fstec.ru/vul/2015-09846",
"Source": "BDU"
},
{
"RefID": "CVE-2014-4322",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4322",
"Source": "CVE"
},
{
"RefID": "CVE-2014-8133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8133",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9419",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9419",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9420",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9420",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9584",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9584",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9683",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9683",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9728",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9729",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9730",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9730",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9731",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9731",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 3.18.2-alt1. \nSecurity Fix(es):\n\n * BDU:2015-09846: Уязвимости операционной системы Ubuntu, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2014-4322: drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application.\n\n * CVE-2014-8133: arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.\n\n * CVE-2014-9419: The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.\n\n * CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.\n\n * CVE-2014-9584: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.\n\n * CVE-2014-9683: Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.\n\n * CVE-2014-9728: The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.\n\n * CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.\n\n * CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.\n\n * CVE-2014-9731: The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \\0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-01-09"
},
"Updated": {
"Date": "2015-01-09"
},
"BDUs": [
{
"ID": "BDU:2015-09846",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09846",
"Impact": "Critical",
"Public": "20150324"
}
],
"CVEs": [
{
"ID": "CVE-2014-4322",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4322",
"Impact": "High",
"Public": "20141224"
},
{
"ID": "CVE-2014-8133",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8133",
"Impact": "Low",
"Public": "20141217"
},
{
"ID": "CVE-2014-9419",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9419",
"Impact": "Low",
"Public": "20141226"
},
{
"ID": "CVE-2014-9420",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9420",
"Impact": "Low",
"Public": "20141226"
},
{
"ID": "CVE-2014-9584",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9584",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2014-9683",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9683",
"Impact": "Low",
"Public": "20150303"
},
{
"ID": "CVE-2014-9728",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9728",
"Impact": "Low",
"Public": "20150831"
},
{
"ID": "CVE-2014-9729",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9729",
"Impact": "Low",
"Public": "20150831"
},
{
"ID": "CVE-2014-9730",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9730",
"Impact": "Low",
"Public": "20150831"
},
{
"ID": "CVE-2014-9731",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9731",
"Impact": "Low",
"Public": "20150831"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20151018001",
"Comment": "kernel-doc-un is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018003",
"Comment": "kernel-headers-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018004",
"Comment": "kernel-image-domU-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018005",
"Comment": "kernel-image-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018006",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018007",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018008",
"Comment": "kernel-modules-drm-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018009",
"Comment": "kernel-modules-ide-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018010",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:3.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151018012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:3.18.2-alt1"
}
]
}
]
}
}
]
}