vuln-list-alt/oval/p9/ALT-PU-2019-1286/definitions.json
2024-06-28 13:17:52 +00:00

285 lines
12 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191286",
"Version": "oval:org.altlinux.errata:def:20191286",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1286: package `kernel-image-un-def` update to version 4.19.24-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1286",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1286",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01183",
"RefURL": "https://bdu.fstec.ru/vul/2019-01183",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01346",
"RefURL": "https://bdu.fstec.ru/vul/2019-01346",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01352",
"RefURL": "https://bdu.fstec.ru/vul/2019-01352",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02782",
"RefURL": "https://bdu.fstec.ru/vul/2019-02782",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03996",
"RefURL": "https://bdu.fstec.ru/vul/2019-03996",
"Source": "BDU"
},
{
"RefID": "CVE-2019-3819",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3819",
"Source": "CVE"
},
{
"RefID": "CVE-2019-6974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7221",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7222",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Source": "CVE"
},
{
"RefID": "CVE-2019-8956",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8956",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.19.24-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01183: Уязвимость реализации протокола SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2019-01346: Уязвимость функции kvm_ioctl_create_device ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01352: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-02782: Уязвимость функции hid_debug_events_read () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03996: Уязвимость ядра операционной системы Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2019-3819: A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.\n\n * CVE-2019-6974: In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.\n\n * CVE-2019-7221: The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.\n\n * CVE-2019-7222: The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.\n\n * CVE-2019-8956: In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the \"sctp_sendmsg()\" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-02-22"
},
"Updated": {
"Date": "2019-02-22"
},
"BDUs": [
{
"ID": "BDU:2019-01183",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-01183",
"Impact": "High",
"Public": "20190201"
},
{
"ID": "BDU:2019-01346",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01346",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-01352",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01352",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "BDU:2019-02782",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-835",
"Href": "https://bdu.fstec.ru/vul/2019-02782",
"Impact": "Low",
"Public": "20190124"
},
{
"ID": "BDU:2019-03996",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03996",
"Impact": "Low",
"Public": "20190207"
}
],
"CVEs": [
{
"ID": "CVE-2019-3819",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3819",
"Impact": "Low",
"Public": "20190125"
},
{
"ID": "CVE-2019-6974",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974",
"Impact": "High",
"Public": "20190215"
},
{
"ID": "CVE-2019-7221",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7221",
"Impact": "High",
"Public": "20190321"
},
{
"ID": "CVE-2019-7222",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222",
"Impact": "Low",
"Public": "20190321"
},
{
"ID": "CVE-2019-8956",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8956",
"Impact": "High",
"Public": "20190401"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191286001",
"Comment": "kernel-doc-un is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286003",
"Comment": "kernel-headers-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286005",
"Comment": "kernel-image-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286011",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286012",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.19.24-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191286013",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.19.24-alt1"
}
]
}
]
}
}
]
}