341 lines
16 KiB
JSON
341 lines
16 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20182002",
|
|
"Version": "oval:org.altlinux.errata:def:20182002",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2018-2002: package `kernel-image-std-def` update to version 4.14.55-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p9"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2018-2002",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2002",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01054",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01054",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01055",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01055",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01057",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01057",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01058",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01058",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01059",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01059",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01060",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01060",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-10876",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10876",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-10877",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10877",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-10879",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-10880",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-10881",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-10882",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10882",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-10883",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-14634",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades kernel-image-std-def to version 4.14.55-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01054: Уязвимость функции ext4_ext_remove_space() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-01055: Уязвимость функции ext4_ext_drop_refs() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-01057: Уязвимость функции ext4_xattr_set_entry() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01058: Уязвимость функции ext4_update_inline_data() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01059: Уязвимость в файле transaction.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2019-01060: Уязвимость функции jbd2_journal_dirty_metadata() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-10876: A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.\n\n * CVE-2018-10877: Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.\n\n * CVE-2018-10879: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.\n\n * CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.\n\n * CVE-2018-10881: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.\n\n * CVE-2018-10882: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.\n\n * CVE-2018-10883: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.\n\n * CVE-2018-14634: An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2018-07-12"
|
|
},
|
|
"Updated": {
|
|
"Date": "2018-07-12"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2019-01054",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01054",
|
|
"Impact": "Low",
|
|
"Public": "20180614"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-01055",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01055",
|
|
"Impact": "Low",
|
|
"Public": "20180614"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-01057",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01057",
|
|
"Impact": "High",
|
|
"Public": "20180613"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-01058",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01058",
|
|
"Impact": "Low",
|
|
"Public": "20180616"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-01059",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01059",
|
|
"Impact": "Low",
|
|
"Public": "20180617"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-01060",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01060",
|
|
"Impact": "Low",
|
|
"Public": "20180616"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2018-10876",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10876",
|
|
"Impact": "Low",
|
|
"Public": "20180726"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-10877",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10877",
|
|
"Impact": "Low",
|
|
"Public": "20180718"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-10879",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879",
|
|
"Impact": "High",
|
|
"Public": "20180726"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-10880",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880",
|
|
"Impact": "Low",
|
|
"Public": "20180725"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-10881",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881",
|
|
"Impact": "Low",
|
|
"Public": "20180726"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-10882",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10882",
|
|
"Impact": "Low",
|
|
"Public": "20180727"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-10883",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883",
|
|
"Impact": "Low",
|
|
"Public": "20180730"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-14634",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634",
|
|
"Impact": "High",
|
|
"Public": "20180925"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:9",
|
|
"cpe:/o:alt:workstation:9",
|
|
"cpe:/o:alt:server:9",
|
|
"cpe:/o:alt:server-v:9",
|
|
"cpe:/o:alt:education:9",
|
|
"cpe:/o:alt:slinux:9",
|
|
"cpe:/o:alt:starterkit:p9",
|
|
"cpe:/o:alt:kworkstation:9.1",
|
|
"cpe:/o:alt:workstation:9.1",
|
|
"cpe:/o:alt:server:9.1",
|
|
"cpe:/o:alt:server-v:9.1",
|
|
"cpe:/o:alt:education:9.1",
|
|
"cpe:/o:alt:slinux:9.1",
|
|
"cpe:/o:alt:starterkit:9.1",
|
|
"cpe:/o:alt:kworkstation:9.2",
|
|
"cpe:/o:alt:workstation:9.2",
|
|
"cpe:/o:alt:server:9.2",
|
|
"cpe:/o:alt:server-v:9.2",
|
|
"cpe:/o:alt:education:9.2",
|
|
"cpe:/o:alt:slinux:9.2",
|
|
"cpe:/o:alt:starterkit:9.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002001",
|
|
"Comment": "kernel-doc-std is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002002",
|
|
"Comment": "kernel-headers-modules-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002003",
|
|
"Comment": "kernel-headers-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002004",
|
|
"Comment": "kernel-image-domU-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002005",
|
|
"Comment": "kernel-image-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002006",
|
|
"Comment": "kernel-modules-drm-ancient-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002007",
|
|
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002008",
|
|
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002009",
|
|
"Comment": "kernel-modules-drm-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002010",
|
|
"Comment": "kernel-modules-ide-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002011",
|
|
"Comment": "kernel-modules-kvm-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002012",
|
|
"Comment": "kernel-modules-staging-std-def is earlier than 1:4.14.55-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20182002013",
|
|
"Comment": "kernel-modules-v4l-std-def is earlier than 1:4.14.55-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |