2024-06-28 13:17:52 +00:00

257 lines
12 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20201067",
"Version": "oval:org.altlinux.errata:def:20201067",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-1067: package `kernel-image-un-def` update to version 5.4.12-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-1067",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1067",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-04663",
"RefURL": "https://bdu.fstec.ru/vul/2019-04663",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04799",
"RefURL": "https://bdu.fstec.ru/vul/2019-04799",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00156",
"RefURL": "https://bdu.fstec.ru/vul/2020-00156",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00884",
"RefURL": "https://bdu.fstec.ru/vul/2020-00884",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03056",
"RefURL": "https://bdu.fstec.ru/vul/2021-03056",
"Source": "BDU"
},
{
"RefID": "CVE-2019-14615",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14895",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14895",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19053",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19053",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19078",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19078",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20636",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 5.4.12-alt1. \nSecurity Fix(es):\n\n * BDU:2019-04663: Уязвимость функции rpmsg_eptdev_write_iter() (drivers/rpmsg/rpmsg_char.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04799: Уязвимость функции mwifiex_process_country_ie() (drivers/net/wireless/marvell/mwifiex/sta_ioctl.c) драйвера Marvell WiFi ядра операционной системы Linux, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00156: Уязвимость функции ath10k_usb_hif_tx_sg из drivers/net/wireless/ath/ath10k/usb.c ядра операционной системы Linux, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00884: Уязвимость микропрограммного обеспечения процессоров Intel c Intel Processor Graphics, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-03056: Уязвимость компонента drivers/input/input.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.\n\n * CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.\n\n * CVE-2019-19053: A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.\n\n * CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.\n\n * CVE-2019-20636: In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-01-17"
},
"Updated": {
"Date": "2020-01-17"
},
"BDUs": [
{
"ID": "BDU:2019-04663",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04663",
"Impact": "High",
"Public": "20191004"
},
{
"ID": "BDU:2019-04799",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04799",
"Impact": "Critical",
"Public": "20191128"
},
{
"ID": "BDU:2020-00156",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00156",
"Impact": "High",
"Public": "20190923"
},
{
"ID": "BDU:2020-00884",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-00884",
"Impact": "Low",
"Public": "20200109"
},
{
"ID": "BDU:2021-03056",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-03056",
"Impact": "Low",
"Public": "20191213"
}
],
"CVEs": [
{
"ID": "CVE-2019-14615",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"Impact": "Low",
"Public": "20200117"
},
{
"ID": "CVE-2019-14895",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14895",
"Impact": "Critical",
"Public": "20191129"
},
{
"ID": "CVE-2019-19053",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19053",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19078",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19078",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-20636",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
"Impact": "Low",
"Public": "20200408"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20201067001",
"Comment": "kernel-doc-un is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067003",
"Comment": "kernel-headers-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067004",
"Comment": "kernel-image-domU-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067005",
"Comment": "kernel-image-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.4.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201067012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:5.4.12-alt1"
}
]
}
]
}
}
]
}