vuln-list-alt/oval/p10/ALT-PU-2021-1051/definitions.json
2024-06-28 13:17:52 +00:00

189 lines
8.1 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211051",
"Version": "oval:org.altlinux.errata:def:20211051",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1051: package `kernel-image-mp` update to version 5.10.8-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1051",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1051",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-02587",
"RefURL": "https://bdu.fstec.ru/vul/2021-02587",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02505",
"RefURL": "https://bdu.fstec.ru/vul/2022-02505",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07048",
"RefURL": "https://bdu.fstec.ru/vul/2022-07048",
"Source": "BDU"
},
{
"RefID": "CVE-2020-28374",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36158",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36322",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.10.8-alt1. \nSecurity Fix(es):\n\n * BDU:2021-02587: Уязвимость драйверов drivers/target/target_core_xcopy.c ядра операционной системы Linux, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2022-02505: Уязвимость реализации файловой системы FUSE ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07048: Уязвимость функции mwifiex_cmd_802_11_ad_hoc_start() драйвера marvell ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2020-28374: In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.\n\n * CVE-2020-36158: mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.\n\n * CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-01-17"
},
"Updated": {
"Date": "2021-01-17"
},
"BDUs": [
{
"ID": "BDU:2021-02587",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2021-02587",
"Impact": "High",
"Public": "20210111"
},
{
"ID": "BDU:2022-02505",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404, CWE-459",
"Href": "https://bdu.fstec.ru/vul/2022-02505",
"Impact": "Low",
"Public": "20201210"
},
{
"ID": "BDU:2022-07048",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-07048",
"Impact": "Low",
"Public": "20201208"
}
],
"CVEs": [
{
"ID": "CVE-2020-28374",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
"Impact": "High",
"Public": "20210113"
},
{
"ID": "CVE-2020-36158",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"Impact": "Low",
"Public": "20210105"
},
{
"ID": "CVE-2020-36322",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-459",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322",
"Impact": "Low",
"Public": "20210414"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211051001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.10.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211051002",
"Comment": "kernel-headers-mp is earlier than 0:5.10.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211051003",
"Comment": "kernel-image-mp is earlier than 0:5.10.8-alt1"
}
]
}
]
}
}
]
}