389 lines
20 KiB
JSON
389 lines
20 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20182210",
|
||
"Version": "oval:org.altlinux.errata:def:20182210",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-2210: package `kernel-image-mp` update to version 4.18.4-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-2210",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2210",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-00979",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-00979",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01436",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01436",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02163",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02163",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04744",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04744",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00735",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00735",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02916",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02916",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01417",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01417",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01418",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01418",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01420",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01420",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01834",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01834",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10853",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10853",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1118",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-14656",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14656",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-15471",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15471",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-15572",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15572",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-15594",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15594",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-20976",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20976",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5390",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5391",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-10207",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10774",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20219",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20219",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-mp to version 4.18.4-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00979: Уязвимость функций tcp_collapse_ofo_queue и tcp_prune_ofo_queue операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-01436: Уязвимость ядра операционной системы Linux, связанная с ошибками обработки фрагментированных IP-пакетов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02163: Уязвимость функции show_opcodes ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04744: Уязвимость драйверов drivers/bluetooth/hci_ath.c, drivers/bluetooth/hci_bcm.c, drivers/bluetooth/hci_intel.c, drivers/bluetooth/hci_ldisc.c, drivers/bluetooth/hci_mrvl.c, drivers/bluetooth/hci_qca.c, drivers/bluetooth/hci_uart.h для UART-подключаемых адаптеров Bluetooth ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00735: Уязвимость функции xenvif_set_hash_mapping гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-02916: Уязвимость компонента fs/xfs/xfs_super.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2021-01417: Уязвимость в файле arch/x86/kernel/paravirt.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01418: Уязвимость функции spectre_v2_select_mitigation ядра операционной системы Linux, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01420: Уязвимость функции vhost_new_msg() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01834: Уязвимость функции n_tty_receive_char_special ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-10853: A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.\n\n * CVE-2018-1118: Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.\n\n * CVE-2018-14656: A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.\n\n * CVE-2018-15471: An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.\n\n * CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.\n\n * CVE-2018-15594: arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.\n\n * CVE-2018-20976: An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.\n\n * CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.\n\n * CVE-2018-5391: The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.\n\n * CVE-2019-10207: A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.\n\n * CVE-2020-10774: A memory disclosure flaw was found in the Linux kernel's versions before 4.18.0-193.el8 in the sysctl subsystem when reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.\n\n * CVE-2021-20219: A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a changing ldata-\u003eread_head, and a missing sanity check) and cause a threat to the system availability.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-08-24"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-08-24"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2018-00979",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-00979",
|
||
"Impact": "High",
|
||
"Public": "20180723"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01436",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20, CWE-400",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01436",
|
||
"Impact": "High",
|
||
"Public": "20180805"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02163",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02163",
|
||
"Impact": "Low",
|
||
"Public": "20181008"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04744",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04744",
|
||
"Impact": "Low",
|
||
"Public": "20190729"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00735",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00735",
|
||
"Impact": "High",
|
||
"Public": "20180816"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02916",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02916",
|
||
"Impact": "High",
|
||
"Public": "20180515"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01417",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01417",
|
||
"Impact": "Low",
|
||
"Public": "20180820"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01418",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01418",
|
||
"Impact": "Low",
|
||
"Public": "20180731"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01420",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-665",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01420",
|
||
"Impact": "Low",
|
||
"Public": "20180509"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01834",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404, CWE-606, CWE-697",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01834",
|
||
"Impact": "Low",
|
||
"Public": "20210201"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-10853",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10853",
|
||
"Impact": "High",
|
||
"Public": "20180911"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1118",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-665",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118",
|
||
"Impact": "Low",
|
||
"Public": "20180510"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-14656",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14656",
|
||
"Impact": "Low",
|
||
"Public": "20181008"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-15471",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15471",
|
||
"Impact": "High",
|
||
"Public": "20180817"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-15572",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15572",
|
||
"Impact": "Low",
|
||
"Public": "20180820"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-15594",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15594",
|
||
"Impact": "Low",
|
||
"Public": "20180820"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-20976",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20976",
|
||
"Impact": "High",
|
||
"Public": "20190819"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5390",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390",
|
||
"Impact": "High",
|
||
"Public": "20180806"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5391",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391",
|
||
"Impact": "High",
|
||
"Public": "20180906"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-10207",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10774",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-805",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
|
||
"Impact": "Low",
|
||
"Public": "20210527"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20219",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-697",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20219",
|
||
"Impact": "Low",
|
||
"Public": "20210323"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182210001",
|
||
"Comment": "kernel-headers-modules-mp is earlier than 0:4.18.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182210002",
|
||
"Comment": "kernel-headers-mp is earlier than 0:4.18.4-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182210003",
|
||
"Comment": "kernel-image-mp is earlier than 0:4.18.4-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |