323 lines
16 KiB
JSON
323 lines
16 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20131264",
|
|
"Version": "oval:org.altlinux.errata:def:20131264",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2013-1264: package `kernel-image-un-def` update to version 3.12.4-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p9"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2013-1264",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2013-1264",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00100",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00100",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-4563",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4563",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-6432",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6432",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7263",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7263",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7264",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7264",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7265",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7265",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7266",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7266",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7267",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7267",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7268",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7268",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7269",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7269",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7270",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7270",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7271",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7271",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7281",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7281",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7348",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7348",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades kernel-image-un-def to version 3.12.4-alt1. \nSecurity Fix(es):\n\n * BDU:2014-00100: Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфиденциальной информации из памяти ядра\n\n * CVE-2013-4563: The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before inserting a fragment header, which allows remote attackers to cause a denial of service (panic) via a large IPv6 UDP packet, as demonstrated by use of the Token Bucket Filter (TBF) queueing discipline.\n\n * CVE-2013-6432: The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.\n\n * CVE-2013-7263: The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.\n\n * CVE-2013-7264: The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7265: The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7266: The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7267: The atalk_recvmsg function in net/appletalk/ddp.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7268: The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7269: The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7270: The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7271: The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7281: The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7348: Double free vulnerability in the ioctx_alloc function in fs/aio.c in the Linux kernel before 3.12.4 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via vectors involving an error condition in the aio_setup_ring function.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2013-12-09"
|
|
},
|
|
"Updated": {
|
|
"Date": "2013-12-09"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2014-00100",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00100",
|
|
"Impact": "Low",
|
|
"Public": "20140826"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2013-4563",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4563",
|
|
"Impact": "High",
|
|
"Public": "20131120"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-6432",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6432",
|
|
"Impact": "Low",
|
|
"Public": "20131209"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7263",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7263",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7264",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7264",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7265",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7265",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7266",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7266",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7267",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7267",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7268",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7268",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7269",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7269",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7270",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7270",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7271",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7271",
|
|
"Impact": "Low",
|
|
"Public": "20140106"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7281",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7281",
|
|
"Impact": "Low",
|
|
"Public": "20140108"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7348",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7348",
|
|
"Impact": "Low",
|
|
"Public": "20140401"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:9",
|
|
"cpe:/o:alt:workstation:9",
|
|
"cpe:/o:alt:server:9",
|
|
"cpe:/o:alt:server-v:9",
|
|
"cpe:/o:alt:education:9",
|
|
"cpe:/o:alt:slinux:9",
|
|
"cpe:/o:alt:starterkit:p9",
|
|
"cpe:/o:alt:kworkstation:9.1",
|
|
"cpe:/o:alt:workstation:9.1",
|
|
"cpe:/o:alt:server:9.1",
|
|
"cpe:/o:alt:server-v:9.1",
|
|
"cpe:/o:alt:education:9.1",
|
|
"cpe:/o:alt:slinux:9.1",
|
|
"cpe:/o:alt:starterkit:9.1",
|
|
"cpe:/o:alt:kworkstation:9.2",
|
|
"cpe:/o:alt:workstation:9.2",
|
|
"cpe:/o:alt:server:9.2",
|
|
"cpe:/o:alt:server-v:9.2",
|
|
"cpe:/o:alt:education:9.2",
|
|
"cpe:/o:alt:slinux:9.2",
|
|
"cpe:/o:alt:starterkit:9.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264001",
|
|
"Comment": "kernel-doc-un is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264002",
|
|
"Comment": "kernel-headers-modules-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264003",
|
|
"Comment": "kernel-headers-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264004",
|
|
"Comment": "kernel-image-domU-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264005",
|
|
"Comment": "kernel-image-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264006",
|
|
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264007",
|
|
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264008",
|
|
"Comment": "kernel-modules-drm-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264009",
|
|
"Comment": "kernel-modules-ide-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264010",
|
|
"Comment": "kernel-modules-kvm-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264011",
|
|
"Comment": "kernel-modules-staging-un-def is earlier than 1:3.12.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131264012",
|
|
"Comment": "kernel-modules-v4l-un-def is earlier than 1:3.12.4-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |