2024-06-28 13:17:52 +00:00

253 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202234",
"Version": "oval:org.altlinux.errata:def:20202234",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2234: package `kernel-image-un-def` update to version 5.7.5-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2234",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2234",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-03071",
"RefURL": "https://bdu.fstec.ru/vul/2020-03071",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05546",
"RefURL": "https://bdu.fstec.ru/vul/2020-05546",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05552",
"RefURL": "https://bdu.fstec.ru/vul/2020-05552",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06410",
"RefURL": "https://bdu.fstec.ru/vul/2021-06410",
"Source": "BDU"
},
{
"RefID": "CVE-2020-10757",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757",
"Source": "CVE"
},
{
"RefID": "CVE-2020-13974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29368",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29374",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29374",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 5.7.5-alt1. \nSecurity Fix(es):\n\n * BDU:2020-03071: Уязвимость компонента drivers/tty/vt/keyboard.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-05546: Уязвимость функции __split_huge_pmd (mm/huge_memory.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-05552: Уязвимость функции get_user_pages(), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06410: Уязвимость компонента mm/mremap.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю повысить свои привилегии в системе\n\n * CVE-2020-10757: A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.\n\n * CVE-2020-13974: An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.\n\n * CVE-2020-29368: An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.\n\n * CVE-2020-29374: An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-06-25"
},
"Updated": {
"Date": "2020-06-25"
},
"BDUs": [
{
"ID": "BDU:2020-03071",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-03071",
"Impact": "High",
"Public": "20200527"
},
{
"ID": "BDU:2020-05546",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-05546",
"Impact": "High",
"Public": "20200603"
},
{
"ID": "BDU:2020-05552",
"CVSS": "AV:L/AC:M/Au:S/C:P/I:P/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-362, CWE-863",
"Href": "https://bdu.fstec.ru/vul/2020-05552",
"Impact": "Low",
"Public": "20200602"
},
{
"ID": "BDU:2021-06410",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-06410",
"Impact": "High",
"Public": "20200604"
}
],
"CVEs": [
{
"ID": "CVE-2020-10757",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757",
"Impact": "High",
"Public": "20200609"
},
{
"ID": "CVE-2020-13974",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"Impact": "High",
"Public": "20200609"
},
{
"ID": "CVE-2020-29368",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"Impact": "High",
"Public": "20201128"
},
{
"ID": "CVE-2020-29374",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29374",
"Impact": "Low",
"Public": "20201128"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202234001",
"Comment": "kernel-doc-un is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234003",
"Comment": "kernel-headers-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234004",
"Comment": "kernel-image-domU-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234005",
"Comment": "kernel-image-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.7.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202234012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:5.7.5-alt1"
}
]
}
]
}
}
]
}