555 lines
30 KiB
JSON
555 lines
30 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20181971",
|
||
"Version": "oval:org.altlinux.errata:def:20181971",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-1971: package `kernel-image-un-def` update to version 4.17.4-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-1971",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1971",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00517",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00517",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01345",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01345",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02508",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02508",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03263",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03263",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03265",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03265",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03305",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03305",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01415",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01415",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01436",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01436",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00150",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00150",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03968",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03968",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01296",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01296",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10723",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10723",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1120",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12232",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12233",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12233",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12633",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12633",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12896",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12896",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12904",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12904",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13053",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13053",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13093",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13093",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13094",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13094",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13095",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13095",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13097",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13097",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13098",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13098",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13100",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13100",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13406",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13406",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-18690",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18690",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-25020",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25020",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-6554",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6554",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-6555",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6555",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16921",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16921",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-un-def to version 4.17.4-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00517: Уязвимость функции alarm_timer_nsleep (kernel/time/alarmtimer.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01345: Уязвимость функции xfs_attr_shortform_addname реализации файловой системы XFS операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02508: Уязвимость функции irda_setsockopt ядра операционной системы Linux, позволяющая нарушителю вызывать отказ в обслуживании\n\n * BDU:2020-03263: Уязвимость функции secs_per_zone ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03265: Уязвимость функции incorrect user_block_count ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03305: Уязвимость функции mmap()ing ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01415: Уязвимость драйвера drivers/staging/irda/net/af_irda.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01436: Уязвимость компонента time/posix-timers.c ядра операционной системы Linux, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00150: Уязвимость подсистемы BPF ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-03968: Уязвимость компонента fs/xfs/libxfs/xfs_inode_buf.c файловой системы XFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01296: Уязвимость функции uvesafb_setcmap function (drivers/video/fbdev/uvesafb.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * CVE-2016-10723: An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. NOTE: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that \"the underlying problem is non-trivial to handle.\n\n * CVE-2018-1120: A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).\n\n * CVE-2018-12232: In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.\n\n * CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.\n\n * CVE-2018-12633: An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (hdr.size_in and hdr.size_out) in the header between the two fetches because of a race condition, leading to severe kernel errors, such as buffer over-accesses. This bug can cause a local denial of service and information leakage.\n\n * CVE-2018-12896: An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.\n\n * CVE-2018-12904: In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.\n\n * CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.\n\n * CVE-2018-13093: An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-\u003ei_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.\n\n * CVE-2018-13094: An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.\n\n * CVE-2018-13095: An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.\n\n * CVE-2018-13097: An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.17.3. There is an out-of-bounds read or a divide-by-zero error for an incorrect user_block_count in a corrupted f2fs image, leading to a denial of service (BUG).\n\n * CVE-2018-13098: An issue was discovered in fs/f2fs/inode.c in the Linux kernel through 4.17.3. A denial of service (slab out-of-bounds read and BUG) can occur for a modified f2fs filesystem image in which FI_EXTRA_ATTR is set in an inode.\n\n * CVE-2018-13100: An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.17.3, which does not properly validate secs_per_zone in a corrupted f2fs image, as demonstrated by a divide-by-zero error.\n\n * CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.\n\n * CVE-2018-18690: In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.\n\n * CVE-2018-25020: The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.\n\n * CVE-2018-6554: Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.\n\n * CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.\n\n * CVE-2019-16921: In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-07-03"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-07-03"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-00517",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00517",
|
||
"Impact": "Low",
|
||
"Public": "20180701"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01345",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-19, CWE-754",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01345",
|
||
"Impact": "Low",
|
||
"Public": "20180417"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02508",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02508",
|
||
"Impact": "High",
|
||
"Public": "20180904"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03263",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03263",
|
||
"Impact": "Low",
|
||
"Public": "20180702"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03265",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125, CWE-369",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03265",
|
||
"Impact": "Low",
|
||
"Public": "20180702"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03305",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119, CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03305",
|
||
"Impact": "Low",
|
||
"Public": "20180517"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01415",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-772",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01415",
|
||
"Impact": "Low",
|
||
"Public": "20180904"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01436",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01436",
|
||
"Impact": "Low",
|
||
"Public": "20180701"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00150",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00150",
|
||
"Impact": "High",
|
||
"Public": "20180517"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03968",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03968",
|
||
"Impact": "Low",
|
||
"Public": "20180621"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01296",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01296",
|
||
"Impact": "High",
|
||
"Public": "20180612"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2016-10723",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10723",
|
||
"Impact": "Low",
|
||
"Public": "20180621"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1120",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120",
|
||
"Impact": "Low",
|
||
"Public": "20180620"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12232",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232",
|
||
"Impact": "Low",
|
||
"Public": "20180612"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12233",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12233",
|
||
"Impact": "High",
|
||
"Public": "20180612"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12633",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12633",
|
||
"Impact": "Low",
|
||
"Public": "20180622"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12896",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12896",
|
||
"Impact": "Low",
|
||
"Public": "20180702"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12904",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12904",
|
||
"Impact": "Low",
|
||
"Public": "20180627"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13053",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13053",
|
||
"Impact": "Low",
|
||
"Public": "20180702"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13093",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13093",
|
||
"Impact": "Low",
|
||
"Public": "20180703"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13094",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13094",
|
||
"Impact": "Low",
|
||
"Public": "20180703"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13095",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13095",
|
||
"Impact": "Low",
|
||
"Public": "20180703"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13097",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13097",
|
||
"Impact": "Low",
|
||
"Public": "20180703"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13098",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13098",
|
||
"Impact": "Low",
|
||
"Public": "20180703"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13100",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13100",
|
||
"Impact": "Low",
|
||
"Public": "20180703"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13406",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13406",
|
||
"Impact": "High",
|
||
"Public": "20180706"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-18690",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-754",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18690",
|
||
"Impact": "Low",
|
||
"Public": "20181026"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-25020",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25020",
|
||
"Impact": "High",
|
||
"Public": "20211208"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-6554",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-772",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6554",
|
||
"Impact": "Low",
|
||
"Public": "20180904"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-6555",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6555",
|
||
"Impact": "High",
|
||
"Public": "20180904"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16921",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-665",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16921",
|
||
"Impact": "High",
|
||
"Public": "20190927"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971001",
|
||
"Comment": "kernel-doc-un is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971002",
|
||
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971003",
|
||
"Comment": "kernel-headers-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971004",
|
||
"Comment": "kernel-image-domU-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971005",
|
||
"Comment": "kernel-image-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971006",
|
||
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971007",
|
||
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971008",
|
||
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971009",
|
||
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971010",
|
||
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971011",
|
||
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971012",
|
||
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.17.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181971013",
|
||
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.17.4-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |