vuln-list-alt/oval/c9f2/ALT-PU-2018-2445/definitions.json
2024-06-28 13:17:52 +00:00

205 lines
9.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182445",
"Version": "oval:org.altlinux.errata:def:20182445",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2445: package `kernel-image-un-def` update to version 4.18.12-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2445",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2445",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-00570",
"RefURL": "https://bdu.fstec.ru/vul/2019-00570",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03459",
"RefURL": "https://bdu.fstec.ru/vul/2019-03459",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01416",
"RefURL": "https://bdu.fstec.ru/vul/2021-01416",
"Source": "BDU"
},
{
"RefID": "CVE-2018-17972",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17972",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18021",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18021",
"Source": "CVE"
},
{
"RefID": "CVE-2018-7755",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7755",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.18.12-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00570: Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-03459: Уязвимость функции fd_locked_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-01416: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) в файле arch/arm64/kvm/guest.c ядра операционной системы Linux, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании\n\n * CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.\n\n * CVE-2018-18021: arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes.\n\n * CVE-2018-7755: An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-10-09"
},
"Updated": {
"Date": "2018-10-09"
},
"BDUs": [
{
"ID": "BDU:2019-00570",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-284, CWE-362",
"Href": "https://bdu.fstec.ru/vul/2019-00570",
"Impact": "Low",
"Public": "20181002"
},
{
"ID": "BDU:2019-03459",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03459",
"Impact": "Low",
"Public": "20180307"
},
{
"ID": "BDU:2021-01416",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01416",
"Impact": "High",
"Public": "20181001"
}
],
"CVEs": [
{
"ID": "CVE-2018-17972",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17972",
"Impact": "Low",
"Public": "20181003"
},
{
"ID": "CVE-2018-18021",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18021",
"Impact": "High",
"Public": "20181007"
},
{
"ID": "CVE-2018-7755",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7755",
"Impact": "Low",
"Public": "20180308"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182445001",
"Comment": "kernel-doc-un is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445003",
"Comment": "kernel-headers-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445005",
"Comment": "kernel-image-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445011",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445012",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.18.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182445013",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.18.12-alt1"
}
]
}
]
}
}
]
}