2024-06-28 13:17:52 +00:00

4537 lines
247 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20231741",
"Version": "oval:org.altlinux.errata:def:20231741",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-1741: package `kernel-image-un-def` update to version 6.1.26-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-1741",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1741",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00790",
"RefURL": "https://bdu.fstec.ru/vul/2022-00790",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00822",
"RefURL": "https://bdu.fstec.ru/vul/2022-00822",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00823",
"RefURL": "https://bdu.fstec.ru/vul/2022-00823",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00833",
"RefURL": "https://bdu.fstec.ru/vul/2022-00833",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00888",
"RefURL": "https://bdu.fstec.ru/vul/2022-00888",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00889",
"RefURL": "https://bdu.fstec.ru/vul/2022-00889",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00891",
"RefURL": "https://bdu.fstec.ru/vul/2022-00891",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00899",
"RefURL": "https://bdu.fstec.ru/vul/2022-00899",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01249",
"RefURL": "https://bdu.fstec.ru/vul/2022-01249",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01499",
"RefURL": "https://bdu.fstec.ru/vul/2022-01499",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01567",
"RefURL": "https://bdu.fstec.ru/vul/2022-01567",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01629",
"RefURL": "https://bdu.fstec.ru/vul/2022-01629",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01630",
"RefURL": "https://bdu.fstec.ru/vul/2022-01630",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01644",
"RefURL": "https://bdu.fstec.ru/vul/2022-01644",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02325",
"RefURL": "https://bdu.fstec.ru/vul/2022-02325",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02328",
"RefURL": "https://bdu.fstec.ru/vul/2022-02328",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02361",
"RefURL": "https://bdu.fstec.ru/vul/2022-02361",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02387",
"RefURL": "https://bdu.fstec.ru/vul/2022-02387",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02443",
"RefURL": "https://bdu.fstec.ru/vul/2022-02443",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02672",
"RefURL": "https://bdu.fstec.ru/vul/2022-02672",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02677",
"RefURL": "https://bdu.fstec.ru/vul/2022-02677",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02681",
"RefURL": "https://bdu.fstec.ru/vul/2022-02681",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02703",
"RefURL": "https://bdu.fstec.ru/vul/2022-02703",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02816",
"RefURL": "https://bdu.fstec.ru/vul/2022-02816",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02817",
"RefURL": "https://bdu.fstec.ru/vul/2022-02817",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02885",
"RefURL": "https://bdu.fstec.ru/vul/2022-02885",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02886",
"RefURL": "https://bdu.fstec.ru/vul/2022-02886",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02999",
"RefURL": "https://bdu.fstec.ru/vul/2022-02999",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03400",
"RefURL": "https://bdu.fstec.ru/vul/2022-03400",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03404",
"RefURL": "https://bdu.fstec.ru/vul/2022-03404",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03409",
"RefURL": "https://bdu.fstec.ru/vul/2022-03409",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03903",
"RefURL": "https://bdu.fstec.ru/vul/2022-03903",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03904",
"RefURL": "https://bdu.fstec.ru/vul/2022-03904",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03921",
"RefURL": "https://bdu.fstec.ru/vul/2022-03921",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03970",
"RefURL": "https://bdu.fstec.ru/vul/2022-03970",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03984",
"RefURL": "https://bdu.fstec.ru/vul/2022-03984",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04052",
"RefURL": "https://bdu.fstec.ru/vul/2022-04052",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04090",
"RefURL": "https://bdu.fstec.ru/vul/2022-04090",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04266",
"RefURL": "https://bdu.fstec.ru/vul/2022-04266",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04271",
"RefURL": "https://bdu.fstec.ru/vul/2022-04271",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04393",
"RefURL": "https://bdu.fstec.ru/vul/2022-04393",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04725",
"RefURL": "https://bdu.fstec.ru/vul/2022-04725",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04878",
"RefURL": "https://bdu.fstec.ru/vul/2022-04878",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05010",
"RefURL": "https://bdu.fstec.ru/vul/2022-05010",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05184",
"RefURL": "https://bdu.fstec.ru/vul/2022-05184",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05402",
"RefURL": "https://bdu.fstec.ru/vul/2022-05402",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05411",
"RefURL": "https://bdu.fstec.ru/vul/2022-05411",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05417",
"RefURL": "https://bdu.fstec.ru/vul/2022-05417",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05481",
"RefURL": "https://bdu.fstec.ru/vul/2022-05481",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05539",
"RefURL": "https://bdu.fstec.ru/vul/2022-05539",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05654",
"RefURL": "https://bdu.fstec.ru/vul/2022-05654",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05657",
"RefURL": "https://bdu.fstec.ru/vul/2022-05657",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05658",
"RefURL": "https://bdu.fstec.ru/vul/2022-05658",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05664",
"RefURL": "https://bdu.fstec.ru/vul/2022-05664",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05692",
"RefURL": "https://bdu.fstec.ru/vul/2022-05692",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05717",
"RefURL": "https://bdu.fstec.ru/vul/2022-05717",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05723",
"RefURL": "https://bdu.fstec.ru/vul/2022-05723",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05777",
"RefURL": "https://bdu.fstec.ru/vul/2022-05777",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05844",
"RefURL": "https://bdu.fstec.ru/vul/2022-05844",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05890",
"RefURL": "https://bdu.fstec.ru/vul/2022-05890",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06024",
"RefURL": "https://bdu.fstec.ru/vul/2022-06024",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06029",
"RefURL": "https://bdu.fstec.ru/vul/2022-06029",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06054",
"RefURL": "https://bdu.fstec.ru/vul/2022-06054",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06169",
"RefURL": "https://bdu.fstec.ru/vul/2022-06169",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06170",
"RefURL": "https://bdu.fstec.ru/vul/2022-06170",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06228",
"RefURL": "https://bdu.fstec.ru/vul/2022-06228",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06397",
"RefURL": "https://bdu.fstec.ru/vul/2022-06397",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06398",
"RefURL": "https://bdu.fstec.ru/vul/2022-06398",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06399",
"RefURL": "https://bdu.fstec.ru/vul/2022-06399",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06400",
"RefURL": "https://bdu.fstec.ru/vul/2022-06400",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06459",
"RefURL": "https://bdu.fstec.ru/vul/2022-06459",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06903",
"RefURL": "https://bdu.fstec.ru/vul/2022-06903",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06912",
"RefURL": "https://bdu.fstec.ru/vul/2022-06912",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07314",
"RefURL": "https://bdu.fstec.ru/vul/2022-07314",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07326",
"RefURL": "https://bdu.fstec.ru/vul/2022-07326",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07327",
"RefURL": "https://bdu.fstec.ru/vul/2022-07327",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07328",
"RefURL": "https://bdu.fstec.ru/vul/2022-07328",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07329",
"RefURL": "https://bdu.fstec.ru/vul/2022-07329",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07330",
"RefURL": "https://bdu.fstec.ru/vul/2022-07330",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07331",
"RefURL": "https://bdu.fstec.ru/vul/2022-07331",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07332",
"RefURL": "https://bdu.fstec.ru/vul/2022-07332",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07333",
"RefURL": "https://bdu.fstec.ru/vul/2022-07333",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07334",
"RefURL": "https://bdu.fstec.ru/vul/2022-07334",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07335",
"RefURL": "https://bdu.fstec.ru/vul/2022-07335",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07337",
"RefURL": "https://bdu.fstec.ru/vul/2022-07337",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07343",
"RefURL": "https://bdu.fstec.ru/vul/2022-07343",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07345",
"RefURL": "https://bdu.fstec.ru/vul/2022-07345",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07347",
"RefURL": "https://bdu.fstec.ru/vul/2022-07347",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07348",
"RefURL": "https://bdu.fstec.ru/vul/2022-07348",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07350",
"RefURL": "https://bdu.fstec.ru/vul/2022-07350",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07351",
"RefURL": "https://bdu.fstec.ru/vul/2022-07351",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07354",
"RefURL": "https://bdu.fstec.ru/vul/2022-07354",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07355",
"RefURL": "https://bdu.fstec.ru/vul/2022-07355",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07356",
"RefURL": "https://bdu.fstec.ru/vul/2022-07356",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07357",
"RefURL": "https://bdu.fstec.ru/vul/2022-07357",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07480",
"RefURL": "https://bdu.fstec.ru/vul/2022-07480",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07504",
"RefURL": "https://bdu.fstec.ru/vul/2022-07504",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07507",
"RefURL": "https://bdu.fstec.ru/vul/2022-07507",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00153",
"RefURL": "https://bdu.fstec.ru/vul/2023-00153",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00358",
"RefURL": "https://bdu.fstec.ru/vul/2023-00358",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00360",
"RefURL": "https://bdu.fstec.ru/vul/2023-00360",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00378",
"RefURL": "https://bdu.fstec.ru/vul/2023-00378",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00379",
"RefURL": "https://bdu.fstec.ru/vul/2023-00379",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00380",
"RefURL": "https://bdu.fstec.ru/vul/2023-00380",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00457",
"RefURL": "https://bdu.fstec.ru/vul/2023-00457",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00626",
"RefURL": "https://bdu.fstec.ru/vul/2023-00626",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00627",
"RefURL": "https://bdu.fstec.ru/vul/2023-00627",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00644",
"RefURL": "https://bdu.fstec.ru/vul/2023-00644",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00645",
"RefURL": "https://bdu.fstec.ru/vul/2023-00645",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00646",
"RefURL": "https://bdu.fstec.ru/vul/2023-00646",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00647",
"RefURL": "https://bdu.fstec.ru/vul/2023-00647",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00670",
"RefURL": "https://bdu.fstec.ru/vul/2023-00670",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00747",
"RefURL": "https://bdu.fstec.ru/vul/2023-00747",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01129",
"RefURL": "https://bdu.fstec.ru/vul/2023-01129",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01191",
"RefURL": "https://bdu.fstec.ru/vul/2023-01191",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01192",
"RefURL": "https://bdu.fstec.ru/vul/2023-01192",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01198",
"RefURL": "https://bdu.fstec.ru/vul/2023-01198",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01199",
"RefURL": "https://bdu.fstec.ru/vul/2023-01199",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01207",
"RefURL": "https://bdu.fstec.ru/vul/2023-01207",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01208",
"RefURL": "https://bdu.fstec.ru/vul/2023-01208",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01209",
"RefURL": "https://bdu.fstec.ru/vul/2023-01209",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01210",
"RefURL": "https://bdu.fstec.ru/vul/2023-01210",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01211",
"RefURL": "https://bdu.fstec.ru/vul/2023-01211",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01212",
"RefURL": "https://bdu.fstec.ru/vul/2023-01212",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01213",
"RefURL": "https://bdu.fstec.ru/vul/2023-01213",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01217",
"RefURL": "https://bdu.fstec.ru/vul/2023-01217",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01274",
"RefURL": "https://bdu.fstec.ru/vul/2023-01274",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01275",
"RefURL": "https://bdu.fstec.ru/vul/2023-01275",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01283",
"RefURL": "https://bdu.fstec.ru/vul/2023-01283",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01285",
"RefURL": "https://bdu.fstec.ru/vul/2023-01285",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01292",
"RefURL": "https://bdu.fstec.ru/vul/2023-01292",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01298",
"RefURL": "https://bdu.fstec.ru/vul/2023-01298",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01299",
"RefURL": "https://bdu.fstec.ru/vul/2023-01299",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01301",
"RefURL": "https://bdu.fstec.ru/vul/2023-01301",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01492",
"RefURL": "https://bdu.fstec.ru/vul/2023-01492",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01745",
"RefURL": "https://bdu.fstec.ru/vul/2023-01745",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01957",
"RefURL": "https://bdu.fstec.ru/vul/2023-01957",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02164",
"RefURL": "https://bdu.fstec.ru/vul/2023-02164",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02348",
"RefURL": "https://bdu.fstec.ru/vul/2023-02348",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02363",
"RefURL": "https://bdu.fstec.ru/vul/2023-02363",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02397",
"RefURL": "https://bdu.fstec.ru/vul/2023-02397",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02408",
"RefURL": "https://bdu.fstec.ru/vul/2023-02408",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02515",
"RefURL": "https://bdu.fstec.ru/vul/2023-02515",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02525",
"RefURL": "https://bdu.fstec.ru/vul/2023-02525",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02527",
"RefURL": "https://bdu.fstec.ru/vul/2023-02527",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02604",
"RefURL": "https://bdu.fstec.ru/vul/2023-02604",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02624",
"RefURL": "https://bdu.fstec.ru/vul/2023-02624",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02628",
"RefURL": "https://bdu.fstec.ru/vul/2023-02628",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02634",
"RefURL": "https://bdu.fstec.ru/vul/2023-02634",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02738",
"RefURL": "https://bdu.fstec.ru/vul/2023-02738",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03163",
"RefURL": "https://bdu.fstec.ru/vul/2023-03163",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03171",
"RefURL": "https://bdu.fstec.ru/vul/2023-03171",
"Source": "BDU"
},
{
"RefID": "CVE-2020-35501",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
"Source": "CVE"
},
{
"RefID": "CVE-2021-33655",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3743",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3847",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4090",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4095",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4135",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4155",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4202",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
"Source": "CVE"
},
{
"RefID": "CVE-2021-44879",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
"Source": "CVE"
},
{
"RefID": "CVE-2021-45402",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0168",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0171",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0171",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0264",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0330",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0382",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0433",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0494",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0516",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0617",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1011",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1012",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1015",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1016",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1048",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1055",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1195",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1198",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1199",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1199",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1204",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1205",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1263",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1353",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1651",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1651",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1671",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1671",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1734",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1852",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1973",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1973",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2078",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2153",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2318",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2318",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2380",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2380",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24448",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24958",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24959",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2503",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503",
"Source": "CVE"
},
{
"RefID": "CVE-2022-25258",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258",
"Source": "CVE"
},
{
"RefID": "CVE-2022-25265",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
"Source": "CVE"
},
{
"RefID": "CVE-2022-25375",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375",
"Source": "CVE"
},
{
"RefID": "CVE-2022-26490",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490",
"Source": "CVE"
},
{
"RefID": "CVE-2022-26878",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
"Source": "CVE"
},
{
"RefID": "CVE-2022-26966",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966",
"Source": "CVE"
},
{
"RefID": "CVE-2022-27223",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223",
"Source": "CVE"
},
{
"RefID": "CVE-2022-27666",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"Source": "CVE"
},
{
"RefID": "CVE-2022-27950",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
"Source": "CVE"
},
{
"RefID": "CVE-2022-28356",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356",
"Source": "CVE"
},
{
"RefID": "CVE-2022-28388",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388",
"Source": "CVE"
},
{
"RefID": "CVE-2022-28389",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28389",
"Source": "CVE"
},
{
"RefID": "CVE-2022-28390",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2873",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"Source": "CVE"
},
{
"RefID": "CVE-2022-28796",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2905",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2905",
"Source": "CVE"
},
{
"RefID": "CVE-2022-29582",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29582",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2961",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2961",
"Source": "CVE"
},
{
"RefID": "CVE-2022-29968",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3077",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3078",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3078",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3104",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3105",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3106",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3107",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3108",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3110",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3111",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3112",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3113",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3114",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3115",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3202",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3202",
"Source": "CVE"
},
{
"RefID": "CVE-2022-32296",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296",
"Source": "CVE"
},
{
"RefID": "CVE-2022-32981",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32981",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3303",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3303",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3344",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3344",
"Source": "CVE"
},
{
"RefID": "CVE-2022-33743",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743",
"Source": "CVE"
},
{
"RefID": "CVE-2022-33744",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33744",
"Source": "CVE"
},
{
"RefID": "CVE-2022-33981",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33981",
"Source": "CVE"
},
{
"RefID": "CVE-2022-34494",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34494",
"Source": "CVE"
},
{
"RefID": "CVE-2022-34495",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34495",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3521",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3521",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3543",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3543",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3544",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3544",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3586",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3586",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3594",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3595",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595",
"Source": "CVE"
},
{
"RefID": "CVE-2022-36123",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36123",
"Source": "CVE"
},
{
"RefID": "CVE-2022-36879",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3707",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
"Source": "CVE"
},
{
"RefID": "CVE-2022-38457",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38457",
"Source": "CVE"
},
{
"RefID": "CVE-2022-39188",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
"Source": "CVE"
},
{
"RefID": "CVE-2022-39189",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
"Source": "CVE"
},
{
"RefID": "CVE-2022-39190",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39190",
"Source": "CVE"
},
{
"RefID": "CVE-2022-39842",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39842",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40133",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40307",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40307",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40768",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40768",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41218",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4127",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4127",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41848",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41848",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41849",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41849",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41850",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41850",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42328",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42328",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42329",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42329",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42703",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42721",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42722",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
"Source": "CVE"
},
{
"RefID": "CVE-2022-43945",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"Source": "CVE"
},
{
"RefID": "CVE-2022-44032",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44032",
"Source": "CVE"
},
{
"RefID": "CVE-2022-44033",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44033",
"Source": "CVE"
},
{
"RefID": "CVE-2022-44034",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44034",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45869",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45869",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45884",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45884",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45885",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45885",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45886",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45886",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45887",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45887",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45888",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45888",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45919",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45919",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4662",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47520",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47520",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47929",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47938",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47938",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47940",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47940",
"Source": "CVE"
},
{
"RefID": "CVE-2022-48423",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-48423",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0458",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0458",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0468",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0468",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0469",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0469",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0590",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1095",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1195",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1249",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1249",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1382",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1838",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1838",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1872",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2006",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2006",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2007",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2007",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2008",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2008",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2019",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2019",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2166",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2166",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2177",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
"Source": "CVE"
},
{
"RefID": "CVE-2023-22995",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995",
"Source": "CVE"
},
{
"RefID": "CVE-2023-22996",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22996",
"Source": "CVE"
},
{
"RefID": "CVE-2023-22997",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22997",
"Source": "CVE"
},
{
"RefID": "CVE-2023-22998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
"Source": "CVE"
},
{
"RefID": "CVE-2023-22999",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23000",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23001",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23003",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23004",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23004",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23454",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23455",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23455",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23559",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23559",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25012",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25012",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2513",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513",
"Source": "CVE"
},
{
"RefID": "CVE-2023-26242",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26242",
"Source": "CVE"
},
{
"RefID": "CVE-2023-26545",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26545",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28327",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28327",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3111",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3111",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3159",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3159",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32269",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32269",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 6.1.26-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00790: Уязвимость реализации функции nfs_atomic_open() ядра операционных систем Linux, позволяющая нарушителю оказать влияние на конфиденциальность данных\n\n * BDU:2022-00822: Уязвимость функции check_alu_op() (kernel/bpf/verifier.c) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00823: Уязвимость компонента drivers/usb/gadget/legacy/inode.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00833: Уязвимость компонента drivers/usb/gadget/legacy/inode.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00888: Уязвимость драйвера drivers/usb/gadget/composite.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00889: Уязвимость подсистемы UDF ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00891: Уязвимость драйвера drivers/usb/gadget/function/rndis.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00899: Уязвимость ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01249: Уязвимость параметра len в файле drivers/net/usb/sr9700.c ядра операционных систем семейства Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2022-01499: Уязвимость реализации функции st21nfca_connectivity_event_received() ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2022-01567: Уязвимость модулей esp4 и esp6 ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01629: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01630: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01644: Уязвимость реализации функции tc_new_tfilter() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-02325: Уязвимость функции gc_data_segment (fs/f2fs/gc.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02328: Уязвимость функции jbd2_journal_wait_updates ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02361: Уязвимость функции smb2_ioctl_query_info() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02387: Уязвимость компонента drivers/hid/hid-elo.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02443: Уязвимость подсистемы прямого доступа к памяти DMA (Direct memory access) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02672: Уязвимость функции ems_usb_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-02677: Уязвимость функции в drivers/bluetooth/virtio_bt.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02681: Уязвимость функции mcba_usb_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-02703: Уязвимость драйвера USB-устройства Xilinx (drivers/usb/gadget/udc/udc-xilinx.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02816: Уязвимость функции pfkey_register ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2022-02817: Уязвимость функции io_rw_init_file ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02885: Уязвимость драйверов drivers/net/hamradio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02886: Уязвимость файла fs/io_uring.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-02999: Уязвимость функции map_get_next_key операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03400: Уязвимость функции scsi_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03404: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03409: Уязвимость компонента net/llc/af_llc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03903: Уязвимость реализации функций preparse_server_key(), free_preparse_server_key() и destroy_server_key() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03904: Уязвимость реализации функции acrn_dev_ioctl() модуля службы гипервизора ACRN (HSM) ядра операционных систем Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-03921: Уязвимость ядра операционной системы Linux, связанная с недостаточной энтропией, позволяющая нарушителю идентифицировать клиентов\n\n * BDU:2022-03970: Уязвимость функции rpmsg_probe (drivers/rpmsg/virtio_rpmsg_bus.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03984: Уязвимость функции rpmsg_virtio_add_ctrl_dev (drivers/rpmsg/virtio_rpmsg_bus.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04052: Уязвимость компонента drivers/block/floppy.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04090: Уязвимость функции nft_set_desc_concat_parse() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-04266: Уязвимость функции nci_request (net/nfc/nci/core.c) интерфейса контроллера NFC (NCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-04271: Уязвимость кроссплатформенного гипервизора Xen ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04393: Уязвимость функции smtcfb_read() ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию и вызвать отказ в обслуживании\n\n * BDU:2022-04725: Уязвимость функции clear_bss ядра операционных систем Linux, связанная с ошибками при очистке начального символа блока (.bss), позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04878: Уязвимость ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05010: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05184: Уязвимость функции kvm_dirty_ring_push (virt/kvm/dirty_ring.c) подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05402: Уязвимость функции nfcmrvl_nci_unregister_dev() операционной системы Linux , позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05411: Уязвимость функции usb_8dev_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05417: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к устройству\n\n * BDU:2022-05481: Уязвимость функции kvm_irq_delivery_to_apic_fast() подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05539: Уязвимость функции pxa3xx_gcu_write ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05654: Уязвимость компонента drivers/firmware/efi/capsule-loader.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05657: Уязвимость функции vmw_cmd_res_check драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_execbuf.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05658: Уязвимость функции vmw_execbuf_tie_context драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_execbuf.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05664: Уязвимость функции xfrm_expand_policies (net/xfrm/xfrm_policy.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05692: Уязвимость функции shmget() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-05717: Уязвимость звуковой подсистемы ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05723: Уязвимость файловой системы FUSE ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05777: Уязвимость ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2022-05844: Уязвимость функции diFree (fs/jfs/inode.c) журналируемой файловой системы (JFS) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-05890: Уязвимость драйвера GPU i915 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-06024: Уязвимость функции ismt_access() драйвера i2c-ismt ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06029: Уязвимость функций dvb_demux_open() и dvb_dmxdev_release() драйвера модуля dvb-core ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06054: Уязвимость функции stex_queuecommand_lck() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06169: Уязвимость функции unmap_mapping_range (include/asm-generic/tlb.h) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06170: Уязвимость функции SNDCTL_DSP_SYNC ioctl звуковой подсистемы ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06228: Уязвимость функции roccat_report_event (drivers/hid/hid-roccat.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06397: Уязвимость драйвера drivers/net/hamradio/6pack.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06398: Уязвимость функции ax25_release() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06399: Уязвимость реализации протокола Amateur Radio AX.25 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06400: Уязвимость реализации протокола Amateur Radio AX.25 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06459: Уязвимость функций unix_sock_destructor() и unix_release_sock() подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06903: Уязвимость компонента net/rose/rose_timer.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06912: Уязвимость ядра операционной системы Linux, связанная с ошибками при освобождении ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07314: Уязвимость драйвера xen-netback ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07326: Уязвимость функции _rtw_init_xmit_priv в модуле drivers/staging/r8188eu/core/rtw_xmit.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07327: Уязвимость функции free_charger_irq() в модуле drivers/power/supply/wm8350_power.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07328: Уязвимость функции ef100_update_stats в модуле drivers/net/hyperv/netvsc_drv.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07329: Уязвимость функции kfd_parse_subtype_iolink в модуле drivers/gpu/drm/amd/amdkfd/kfd_crat.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07330: Уязвимость функции ef100_update_stats в модуле drivers/net/ethernet/sfc/ef100_nic.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07331: Уязвимость функции amvdec_set_canvases() в модуле drivers/staging/media/meson/vdec/vdec_helpers.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07332: Уязвимость функции lkdtm_ARRAY_BOUNDS модуля drivers/misc/lkdtm/bugs.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.\n\n * BDU:2022-07333: Уязвимость функции uapi_finalize() в модуле drivers/infiniband/core/uverbs_uapi.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07334: Уязвимость функции imx_register_uart_clocks() в модуле drivers/clk/imx/clk.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07335: Уязвимость функции malidp_crtc_reset() в модуле drivers/gpu/drm/arm/malidp_crtc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07337: Уязвимость функции mtk_vcodec_fw_vpu_init() в модуле drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07343: Уязвимость функции intr_callback() (drivers/net/usb/r8152.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07345: Уязвимость функции постановки в очередь sch_sfb ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07347: Уязвимость компонента drivers/char/pcmcia/scr24x_cs.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07348: Уязвимость функции kcm_tx_work() (net/kcm/kcmsock.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07350: Уязвимость функционала подсчета ссылок в режиме BSS (Basic Service Set) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07351: Уязвимость ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07354: Уязвимость ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07355: Уязвимость функции bpf_tail_call() подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к данным\n\n * BDU:2022-07356: Уязвимость драйвера drivers/char/pcmcia/synclink_cs.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07357: Уязвимость драйвера drivers/video/fbdev/smscufx.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07480: Уязвимость функции smb2_write (fs/ksmbd/smb2pdu.c) модуля ksmbd ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-07504: Уязвимость подсистемы SMB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07507: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить уровень привилегий\n\n * BDU:2023-00153: Уязвимость функции kfree_skb() драйвера xen-netback ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00358: Уязвимость функции qdisc_graft (net/sched/sch_api.c) подсистемы управления трафиком ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.\n\n * BDU:2023-00360: Уязвимость сетевой файловой системы Network File System (NFS) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00378: Уязвимость функции atm_tc_enqueue() подсистемы приоритизации отправки сетевых пакетов (net/sched/sch_atm.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00379: Уязвимость функции cbq_classify() подсистемы приоритизации отправки сетевых пакетов (net/sched/sch_cbq.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00380: Уязвимость драйвера drivers/net/wireless/rndis_wlan.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-00457: Уязвимость файла fs/io_uring.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00626: Уязвимость функции qdisc_graft (net/sched/sch_api.c) подсистемы управления трафиком ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00627: Уязвимость функции io_install_fixed_file() модуля io_uring/filetable.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00644: Уязвимость драйвера DVB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00645: Уязвимость драйвера DVB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00646: Уязвимость драйвера DVB (drivers/media/dvb-core/dvb_frontend.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.\n\n * BDU:2023-00647: Уязвимость драйвера DVB (drivers/media/dvb-core/dvbdev.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00670: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00747: Уязвимость драйвера drivers/hid/hid-bigbenff.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01129: Уязвимость механизма MPLS (Multiprotocol Label Switching) ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-01191: Уязвимость драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01192: Уязвимость функции drm_gem_shmem_get_sg_table (drivers/gpu/drm/virtio/virtgpu_object.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01198: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) в AMD Secure Encrypted Virtualization (SEV) в модуле virt/kvm/kvm_main.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01199: Уязвимость подсистемы USB модуля drivers/usb/core/hub.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01207: Уязвимость функции nf_tables_updtable (nf_tables_api.c) межсетевого экрана ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01208: Уязвимость функции qmp_get() (drivers/soc/qcom/qcom_aoss.c) драйвера Qualcomm AOSS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01209: Уязвимость функций module_gzip_decompress() и module_xz_decompress() в модуле kernel/module/decompress.c подсистемы загрузки модулей ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01210: Уязвимость функции dwc3_qcom_probe() (drivers/usb/dwc3/dwc3-qcom.c) драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01211: Уязвимость функции tegra_xusb_find_port_node() (drivers/phy/tegra/xusb.c) драйвера NVIDIA Tegra XUSB Pad ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01212: Уязвимость функции ufs_mtk_init_va09_pwr_ctrl() (drivers/scsi/ufs/ufs-mediatek.c) драйвера UFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01213: Уязвимость функции malidp_check_pages_threshold() (drivers/gpu/drm/arm/malidp_planes.c) драйвера Mali-DP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01217: Уязвимость драйвера drivers/bluetooth/hci_qca.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01274: Уязвимость функции cifs_put_tcp_session() (fs/cifs/connect.c) подсистемы SMB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01275: Уязвимость функции fill_files_note() (fs/binfmt_elf.c) подсистемы поддержки файловых систем ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01283: Уязвимость компонента net/unix/diag.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01285: Уязвимость реализации протокола TIPC (Transparent Inter Process Communication) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01292: Уязвимость функции afu_mmio_region_get_by_offset (drivers/fpga/dfl-afu-region.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01298: Уязвимость подсистемы OverlayFS ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-01299: Уязвимость подсистемы KVM AMD для поддержки вложенной виртуализации SVM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01301: Уязвимость подсистемы управления памятью ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, выполнить произвольный код\n\n * BDU:2023-01492: Уязвимость функции expr__ctx_new() (tools/perf/util/expr.c) утилиты perf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * BDU:2023-01745: Уязвимость функции mi_enum_attr() в модуле fs/ntfs3/record.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01957: Уязвимость функции vhost_net_set_backend (drivers/vhost/net.c) подкомпонента virtio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании и раскрыть защищаемую информацию\n\n * BDU:2023-02164: Уязвимость функции io_file_get_fixed() модуля io_uring/io_uring.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02348: Уязвимость драйвера netdevsim ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02363: Уязвимость функции verity_ctr() в модуле drivers/md/dm-verity-target.c подсистемы device-mapper ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код и подключить уязвимое оборудование\n\n * BDU:2023-02397: Уязвимость функции udmabuf_vm_fault() в модуле drivers/dma-buf/udmabuf.c ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код\n\n * BDU:2023-02408: Уязвимость функции virt_to_bus()/bus_to_virt() драйвера dpt_i2o ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02515: Уязвимость функции do_prlimit() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-02525: Уязвимость реализации протокола sctp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02527: Уязвимость функции can_rcv_filter() в модуле net/can/af_can.c ядра операционной системы Linux в функции can_rcv_filter(), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02604: Уязвимость функции rxrpc_unbundle_conn() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02624: Уязвимость реализации сетевого протокола NET/ROM ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-02628: Уязвимость функции ext4_xattr_set_entry() в модуле fs/ext4/xattr.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-02634: Уязвимость функции x86_emulate_insn компонента arch/x86/kvm/emulate.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02738: Уязвимость функции kvm_steal_time_set_preempted() в модуле arch/x86/kvm/x86.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2023-03163: Уязвимость функции prepare_to_relocate() в модуле fs/btrfs/relocation.c файловой системы btrfs ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03171: Уязвимость драйвере протокола IEEE 1394 (FireWire) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2020-35501: A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem\n\n * CVE-2021-33655: When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.\n\n * CVE-2021-3743: An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3847: An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.\n\n * CVE-2021-4002: A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4090: An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.\n\n * CVE-2021-4095: A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2021-4135: A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4155: A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.\n\n * CVE-2021-4202: A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.\n\n * CVE-2021-44879: In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.\n\n * CVE-2021-45402: The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"\n\n * CVE-2022-0168: A denial of service (DOS) issue was found in the Linux kernels smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.\n\n * CVE-2022-0171: A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).\n\n * CVE-2022-0264: A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6\n\n * CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.\n\n * CVE-2022-0382: An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0433: A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0494: A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.\n\n * CVE-2022-0516: A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.\n\n * CVE-2022-0617: A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.\n\n * CVE-2022-0854: A memory leak flaw was found in the Linux kernels DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.\n\n * CVE-2022-1011: A use-after-free flaw was found in the Linux kernels FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.\n\n * CVE-2022-1012: A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.\n\n * CVE-2022-1015: A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.\n\n * CVE-2022-1016: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.\n\n * CVE-2022-1048: A use-after-free flaw was found in the Linux kernels sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-1055: A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5\n\n * CVE-2022-1195: A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.\n\n * CVE-2022-1198: A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.\n\n * CVE-2022-1199: A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.\n\n * CVE-2022-1204: A use-after-free flaw was found in the Linux kernels Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.\n\n * CVE-2022-1205: A NULL pointer dereference flaw was found in the Linux kernels Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.\n\n * CVE-2022-1263: A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.\n\n * CVE-2022-1353: A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.\n\n * CVE-2022-1651: A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.\n\n * CVE-2022-1671: A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.\n\n * CVE-2022-1734: A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.\n\n * CVE-2022-1852: A NULL pointer dereference flaw was found in the Linux kernels KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.\n\n * CVE-2022-1973: A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.\n\n * CVE-2022-2078: A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.\n\n * CVE-2022-2153: A flaw was found in the Linux kernels KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.\n\n * CVE-2022-2318: There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.\n\n * CVE-2022-2380: The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.\n\n * CVE-2022-24448: An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.\n\n * CVE-2022-24958: drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.\n\n * CVE-2022-24959: An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.\n\n * CVE-2022-2503: Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5\n\n * CVE-2022-25258: An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.\n\n * CVE-2022-25265: In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.\n\n * CVE-2022-25375: An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.\n\n * CVE-2022-26490: st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.\n\n * CVE-2022-26878: drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).\n\n * CVE-2022-26966: An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.\n\n * CVE-2022-27223: In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.\n\n * CVE-2022-27666: A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.\n\n * CVE-2022-27950: In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.\n\n * CVE-2022-28356: In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.\n\n * CVE-2022-28388: usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-28389: mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-28390: ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intels iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.\n\n * CVE-2022-28796: jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.\n\n * CVE-2022-2905: An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.\n\n * CVE-2022-29582: In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.\n\n * CVE-2022-2961: A use-after-free flaw was found in the Linux kernels PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-29968: An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.\n\n * CVE-2022-3077: A buffer overflow vulnerability was found in the Linux kernel Intels iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.\n\n * CVE-2022-3078: An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.\n\n * CVE-2022-3104: An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3105: An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().\n\n * CVE-2022-3106: An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().\n\n * CVE-2022-3107: An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.\n\n * CVE-2022-3108: An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().\n\n * CVE-2022-3110: An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.\n\n * CVE-2022-3111: An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().\n\n * CVE-2022-3112: An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3113: An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3114: An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3115: An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3202: A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.\n\n * CVE-2022-32296: The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.\n\n * CVE-2022-32981: An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.\n\n * CVE-2022-3303: A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition\n\n * CVE-2022-3344: A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0).\n\n * CVE-2022-33743: network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.\n\n * CVE-2022-33744: Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.\n\n * CVE-2022-33981: drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.\n\n * CVE-2022-34494: rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.\n\n * CVE-2022-34495: rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.\n\n * CVE-2022-3521: A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.\n\n * CVE-2022-3543: A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor/unix_release_sock of the file net/unix/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043.\n\n * CVE-2022-3544: A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm/damon/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211044.\n\n * CVE-2022-3586: A flaw was found in the Linux kernels networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.\n\n * CVE-2022-3594: A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.\n\n * CVE-2022-3595: A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.\n\n * CVE-2022-36123: The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.\n\n * CVE-2022-36879: An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.\n\n * CVE-2022-3707: A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.\n\n * CVE-2022-38457: A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-39188: An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.\n\n * CVE-2022-39189: An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.\n\n * CVE-2022-39190: An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.\n\n * CVE-2022-39842: An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.\n\n * CVE-2022-40133: A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-40307: An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.\n\n * CVE-2022-40768: drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.\n\n * CVE-2022-41218: In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.\n\n * CVE-2022-4127: A NULL pointer dereference issue was discovered in the Linux kernel in io_files_update_with_index_alloc. A local user could use this flaw to potentially crash the system causing a denial of service.\n\n * CVE-2022-41848: drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.\n\n * CVE-2022-41849: drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.\n\n * CVE-2022-41850: roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.\n\n * CVE-2022-42328: Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).\n\n * CVE-2022-42329: Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).\n\n * CVE-2022-42703: mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.\n\n * CVE-2022-42721: A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.\n\n * CVE-2022-42722: In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.\n\n * CVE-2022-43945: The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\n\n * CVE-2022-44032: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().\n\n * CVE-2022-44033: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().\n\n * CVE-2022-44034: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().\n\n * CVE-2022-45869: A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.\n\n * CVE-2022-45884: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.\n\n * CVE-2022-45885: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.\n\n * CVE-2022-45886: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.\n\n * CVE-2022-45887: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.\n\n * CVE-2022-45888: An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.\n\n * CVE-2022-45919: An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.\n\n * CVE-2022-4662: A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.\n\n * CVE-2022-47520: An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.\n\n * CVE-2022-47929: In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.\n\n * CVE-2022-47938: An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2misc.c has an out-of-bounds read and OOPS for SMB2_TREE_CONNECT.\n\n * CVE-2022-47940: An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.18 before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write.\n\n * CVE-2022-48423: In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. An out-of-bounds write may occur.\n\n * CVE-2023-0458: A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11\n\n * CVE-2023-0468: A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.\n\n * CVE-2023-0469: A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.\n\n * CVE-2023-0590: A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.\n\n * CVE-2023-1095: In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.\n\n * CVE-2023-1195: A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.\n\n * CVE-2023-1249: A use-after-free flaw was found in the Linux kernels core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.\n\n * CVE-2023-1382: A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.\n\n * CVE-2023-1838: A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.\n\n * CVE-2023-1872: A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx-\u003euring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n\n\n * CVE-2023-2006: A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.\n\n * CVE-2023-2007: The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.\n\n * CVE-2023-2008: A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.\n\n * CVE-2023-2019: A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.\n\n * CVE-2023-2166: A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2023-2177: A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2023-22995: In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.\n\n * CVE-2023-22996: In the Linux kernel before 5.17.2, drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use, e.g., with put_device.\n\n * CVE-2023-22997: In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-22998: In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-22999: In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23000: In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.\n\n * CVE-2023-23001: In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23002: In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23003: In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.\n\n * CVE-2023-23004: In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23454: cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).\n\n * CVE-2023-23455: atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).\n\n * CVE-2023-23559: In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.\n\n * CVE-2023-25012: The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.\n\n * CVE-2023-2513: A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.\n\n * CVE-2023-26242: afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow.\n\n * CVE-2023-26545: In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.\n\n * CVE-2023-28327: A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.\n\n * CVE-2023-3111: A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().\n\n * CVE-2023-3159: A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.\n\n * CVE-2023-32269: An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-05-03"
},
"Updated": {
"Date": "2023-05-03"
},
"BDUs": [
{
"ID": "BDU:2022-00790",
"CVSS": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-119, CWE-755, CWE-908, CWE-909",
"Href": "https://bdu.fstec.ru/vul/2022-00790",
"Impact": "Low",
"Public": "20220106"
},
{
"ID": "BDU:2022-00822",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-119, CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-00822",
"Impact": "Low",
"Public": "20220211"
},
{
"ID": "BDU:2022-00823",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416, CWE-763",
"Href": "https://bdu.fstec.ru/vul/2022-00823",
"Impact": "High",
"Public": "20220103"
},
{
"ID": "BDU:2022-00833",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-00833",
"Impact": "Low",
"Public": "20220125"
},
{
"ID": "BDU:2022-00888",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-00888",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "BDU:2022-00889",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-00889",
"Impact": "Low",
"Public": "20220216"
},
{
"ID": "BDU:2022-00891",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200, CWE-668, CWE-1284",
"Href": "https://bdu.fstec.ru/vul/2022-00891",
"Impact": "Low",
"Public": "20220221"
},
{
"ID": "BDU:2022-00899",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-913",
"Href": "https://bdu.fstec.ru/vul/2022-00899",
"Impact": "High",
"Public": "20210519"
},
{
"ID": "BDU:2022-01249",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-01249",
"Impact": "Low",
"Public": "20220218"
},
{
"ID": "BDU:2022-01499",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-01499",
"Impact": "High",
"Public": "20220112"
},
{
"ID": "BDU:2022-01567",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-01567",
"Impact": "High",
"Public": "20220307"
},
{
"ID": "BDU:2022-01629",
"CVSS": "AV:L/AC:M/Au:S/C:P/I:P/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-129, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-01629",
"Impact": "Low",
"Public": "20220317"
},
{
"ID": "BDU:2022-01630",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416, CWE-824",
"Href": "https://bdu.fstec.ru/vul/2022-01630",
"Impact": "Low",
"Public": "20220317"
},
{
"ID": "BDU:2022-01644",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01644",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-02325",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-02325",
"Impact": "Low",
"Public": "20211210"
},
{
"ID": "BDU:2022-02328",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02328",
"Impact": "High",
"Public": "20220226"
},
{
"ID": "BDU:2022-02361",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-02361",
"Impact": "Low",
"Public": "20220105"
},
{
"ID": "BDU:2022-02387",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-02387",
"Impact": "Low",
"Public": "20220124"
},
{
"ID": "BDU:2022-02443",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-02443",
"Impact": "Low",
"Public": "20220214"
},
{
"ID": "BDU:2022-02672",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-02672",
"Impact": "High",
"Public": "20220331"
},
{
"ID": "BDU:2022-02677",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401, CWE-772",
"Href": "https://bdu.fstec.ru/vul/2022-02677",
"Impact": "Low",
"Public": "20211020"
},
{
"ID": "BDU:2022-02681",
"CVSS": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-02681",
"Impact": "Low",
"Public": "20220403"
},
{
"ID": "BDU:2022-02703",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-129",
"Href": "https://bdu.fstec.ru/vul/2022-02703",
"Impact": "High",
"Public": "20220224"
},
{
"ID": "BDU:2022-02816",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-02816",
"Impact": "Low",
"Public": "20220310"
},
{
"ID": "BDU:2022-02817",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-665, CWE-909",
"Href": "https://bdu.fstec.ru/vul/2022-02817",
"Impact": "Low",
"Public": "20220428"
},
{
"ID": "BDU:2022-02885",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02885",
"Impact": "Low",
"Public": "20220221"
},
{
"ID": "BDU:2022-02886",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-367, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02886",
"Impact": "High",
"Public": "20220408"
},
{
"ID": "BDU:2022-02999",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2022-02999",
"Impact": "Low",
"Public": "20211229"
},
{
"ID": "BDU:2022-03400",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2022-03400",
"Impact": "Low",
"Public": "20220111"
},
{
"ID": "BDU:2022-03404",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-03404",
"Impact": "Low",
"Public": "20220107"
},
{
"ID": "BDU:2022-03409",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-03409",
"Impact": "Low",
"Public": "20220402"
},
{
"ID": "BDU:2022-03903",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-03903",
"Impact": "High",
"Public": "20220331"
},
{
"ID": "BDU:2022-03904",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-03904",
"Impact": "Low",
"Public": "20220318"
},
{
"ID": "BDU:2022-03921",
"CVSS": "AV:N/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-203, CWE-330, CWE-331",
"Href": "https://bdu.fstec.ru/vul/2022-03921",
"Impact": "Low",
"Public": "20220518"
},
{
"ID": "BDU:2022-03970",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-03970",
"Impact": "Low",
"Public": "20220626"
},
{
"ID": "BDU:2022-03984",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-03984",
"Impact": "Low",
"Public": "20220626"
},
{
"ID": "BDU:2022-04052",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-04052",
"Impact": "Low",
"Public": "20220426"
},
{
"ID": "BDU:2022-04090",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-04090",
"Impact": "Critical",
"Public": "20220630"
},
{
"ID": "BDU:2022-04266",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-04266",
"Impact": "High",
"Public": "20211117"
},
{
"ID": "BDU:2022-04271",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-04271",
"Impact": "High",
"Public": "20220701"
},
{
"ID": "BDU:2022-04393",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-125, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-04393",
"Impact": "Low",
"Public": "20220713"
},
{
"ID": "BDU:2022-04725",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-04725",
"Impact": "High",
"Public": "20220701"
},
{
"ID": "BDU:2022-04878",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-04878",
"Impact": "High",
"Public": "20220718"
},
{
"ID": "BDU:2022-05010",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-755",
"Href": "https://bdu.fstec.ru/vul/2022-05010",
"Impact": "Low",
"Public": "20211214"
},
{
"ID": "BDU:2022-05184",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-05184",
"Impact": "Low",
"Public": "20220406"
},
{
"ID": "BDU:2022-05402",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05402",
"Impact": "High",
"Public": "20220501"
},
{
"ID": "BDU:2022-05411",
"CVSS": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-05411",
"Impact": "Low",
"Public": "20220403"
},
{
"ID": "BDU:2022-05417",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-05417",
"Impact": "Low",
"Public": "20211215"
},
{
"ID": "BDU:2022-05481",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-05481",
"Impact": "Low",
"Public": "20220325"
},
{
"ID": "BDU:2022-05539",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-05539",
"Impact": "Critical",
"Public": "20220905"
},
{
"ID": "BDU:2022-05654",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05654",
"Impact": "High",
"Public": "20220909"
},
{
"ID": "BDU:2022-05657",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05657",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "BDU:2022-05658",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05658",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "BDU:2022-05664",
"CVSS": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-05664",
"Impact": "Low",
"Public": "20220602"
},
{
"ID": "BDU:2022-05692",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-05692",
"Impact": "Low",
"Public": "20220303"
},
{
"ID": "BDU:2022-05717",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05717",
"Impact": "High",
"Public": "20220322"
},
{
"ID": "BDU:2022-05723",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05723",
"Impact": "High",
"Public": "20220307"
},
{
"ID": "BDU:2022-05777",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-05777",
"Impact": "High",
"Public": "20210820"
},
{
"ID": "BDU:2022-05844",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-05844",
"Impact": "High",
"Public": "20220322"
},
{
"ID": "BDU:2022-05890",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://bdu.fstec.ru/vul/2022-05890",
"Impact": "High",
"Public": "20220125"
},
{
"ID": "BDU:2022-06024",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125, CWE-131",
"Href": "https://bdu.fstec.ru/vul/2022-06024",
"Impact": "Low",
"Public": "20220729"
},
{
"ID": "BDU:2022-06029",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06029",
"Impact": "Low",
"Public": "20220908"
},
{
"ID": "BDU:2022-06054",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-665, CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-06054",
"Impact": "Low",
"Public": "20220908"
},
{
"ID": "BDU:2022-06169",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2022-06169",
"Impact": "Low",
"Public": "20220721"
},
{
"ID": "BDU:2022-06170",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-476, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2022-06170",
"Impact": "Low",
"Public": "20220905"
},
{
"ID": "BDU:2022-06228",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06228",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "BDU:2022-06397",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06397",
"Impact": "Low",
"Public": "20220829"
},
{
"ID": "BDU:2022-06398",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-06398",
"Impact": "High",
"Public": "20220829"
},
{
"ID": "BDU:2022-06399",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06399",
"Impact": "Low",
"Public": "20220829"
},
{
"ID": "BDU:2022-06400",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-06400",
"Impact": "Low",
"Public": "20220829"
},
{
"ID": "BDU:2022-06459",
"CVSS": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-401, CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-06459",
"Impact": "Low",
"Public": "20220929"
},
{
"ID": "BDU:2022-06903",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06903",
"Impact": "Low",
"Public": "20220703"
},
{
"ID": "BDU:2022-06912",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-06912",
"Impact": "Low",
"Public": "20220705"
},
{
"ID": "BDU:2022-07314",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://bdu.fstec.ru/vul/2022-07314",
"Impact": "Low",
"Public": "20221205"
},
{
"ID": "BDU:2022-07326",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07326",
"Impact": "Low",
"Public": "20220518"
},
{
"ID": "BDU:2022-07327",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07327",
"Impact": "Low",
"Public": "20220303"
},
{
"ID": "BDU:2022-07328",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07328",
"Impact": "Low",
"Public": "20220314"
},
{
"ID": "BDU:2022-07329",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-252",
"Href": "https://bdu.fstec.ru/vul/2022-07329",
"Impact": "Low",
"Public": "20220105"
},
{
"ID": "BDU:2022-07330",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07330",
"Impact": "Low",
"Public": "20211215"
},
{
"ID": "BDU:2022-07331",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07331",
"Impact": "Low",
"Public": "20220303"
},
{
"ID": "BDU:2022-07332",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07332",
"Impact": "Low",
"Public": "20220120"
},
{
"ID": "BDU:2022-07333",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07333",
"Impact": "Low",
"Public": "20211231"
},
{
"ID": "BDU:2022-07334",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07334",
"Impact": "Low",
"Public": "20220412"
},
{
"ID": "BDU:2022-07335",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07335",
"Impact": "Low",
"Public": "20211214"
},
{
"ID": "BDU:2022-07337",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07337",
"Impact": "Low",
"Public": "20211215"
},
{
"ID": "BDU:2022-07343",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404, CWE-779",
"Href": "https://bdu.fstec.ru/vul/2022-07343",
"Impact": "High",
"Public": "20221018"
},
{
"ID": "BDU:2022-07345",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-07345",
"Impact": "Low",
"Public": "20221019"
},
{
"ID": "BDU:2022-07347",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2022-07347",
"Impact": "Low",
"Public": "20221029"
},
{
"ID": "BDU:2022-07348",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2022-07348",
"Impact": "High",
"Public": "20221016"
},
{
"ID": "BDU:2022-07350",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2022-07350",
"Impact": "Low",
"Public": "20221013"
},
{
"ID": "BDU:2022-07351",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07351",
"Impact": "Low",
"Public": "20221013"
},
{
"ID": "BDU:2022-07354",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-07354",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "BDU:2022-07355",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-07355",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "BDU:2022-07356",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-07356",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "BDU:2022-07357",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-07357",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "BDU:2022-07480",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-07480",
"Impact": "High",
"Public": "20221223"
},
{
"ID": "BDU:2022-07504",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-07504",
"Impact": "Low",
"Public": "20220728"
},
{
"ID": "BDU:2022-07507",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-07507",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2023-00153",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://bdu.fstec.ru/vul/2023-00153",
"Impact": "Low",
"Public": "20221205"
},
{
"ID": "BDU:2023-00358",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-00358",
"Impact": "Low",
"Public": "20230110"
},
{
"ID": "BDU:2023-00360",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-131, CWE-770",
"Href": "https://bdu.fstec.ru/vul/2023-00360",
"Impact": "High",
"Public": "20220926"
},
{
"ID": "BDU:2023-00378",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-136, CWE-843",
"Href": "https://bdu.fstec.ru/vul/2023-00378",
"Impact": "Low",
"Public": "20230101"
},
{
"ID": "BDU:2023-00379",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-136, CWE-843",
"Href": "https://bdu.fstec.ru/vul/2023-00379",
"Impact": "Low",
"Public": "20230101"
},
{
"ID": "BDU:2023-00380",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190, CWE-680",
"Href": "https://bdu.fstec.ru/vul/2023-00380",
"Impact": "High",
"Public": "20230110"
},
{
"ID": "BDU:2023-00457",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-00457",
"Impact": "Low",
"Public": "20221125"
},
{
"ID": "BDU:2023-00626",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00626",
"Impact": "Low",
"Public": "20221019"
},
{
"ID": "BDU:2023-00627",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00627",
"Impact": "Low",
"Public": "20221125"
},
{
"ID": "BDU:2023-00644",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00644",
"Impact": "High",
"Public": "20221115"
},
{
"ID": "BDU:2023-00645",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00645",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2023-00646",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00646",
"Impact": "High",
"Public": "20221115"
},
{
"ID": "BDU:2023-00647",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00647",
"Impact": "High",
"Public": "20221115"
},
{
"ID": "BDU:2023-00670",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2023-00670",
"Impact": "Low",
"Public": "20221123"
},
{
"ID": "BDU:2023-00747",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00747",
"Impact": "Low",
"Public": "20230131"
},
{
"ID": "BDU:2023-01129",
"CVSS": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2023-01129",
"Impact": "Critical",
"Public": "20230213"
},
{
"ID": "BDU:2023-01191",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2023-01191",
"Impact": "Low",
"Public": "20230228"
},
{
"ID": "BDU:2023-01192",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-436",
"Href": "https://bdu.fstec.ru/vul/2023-01192",
"Impact": "Low",
"Public": "20220719"
},
{
"ID": "BDU:2023-01198",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-459",
"Href": "https://bdu.fstec.ru/vul/2023-01198",
"Impact": "Low",
"Public": "20220421"
},
{
"ID": "BDU:2023-01199",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-455",
"Href": "https://bdu.fstec.ru/vul/2023-01199",
"Impact": "Low",
"Public": "20220830"
},
{
"ID": "BDU:2023-01207",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01207",
"Impact": "Low",
"Public": "20220809"
},
{
"ID": "BDU:2023-01208",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772, CWE-911",
"Href": "https://bdu.fstec.ru/vul/2023-01208",
"Impact": "Low",
"Public": "20220131"
},
{
"ID": "BDU:2023-01209",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01209",
"Impact": "Low",
"Public": "20221111"
},
{
"ID": "BDU:2023-01210",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01210",
"Impact": "Low",
"Public": "20220106"
},
{
"ID": "BDU:2023-01211",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01211",
"Impact": "Low",
"Public": "20211214"
},
{
"ID": "BDU:2023-01212",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01212",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "BDU:2023-01213",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01213",
"Impact": "Low",
"Public": "20220428"
},
{
"ID": "BDU:2023-01217",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01217",
"Impact": "Low",
"Public": "20220106"
},
{
"ID": "BDU:2023-01274",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416, CWE-457",
"Href": "https://bdu.fstec.ru/vul/2023-01274",
"Impact": "Low",
"Public": "20221027"
},
{
"ID": "BDU:2023-01275",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01275",
"Impact": "Low",
"Public": "20220308"
},
{
"ID": "BDU:2023-01283",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01283",
"Impact": "Low",
"Public": "20221201"
},
{
"ID": "BDU:2023-01285",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01285",
"Impact": "Low",
"Public": "20221121"
},
{
"ID": "BDU:2023-01292",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2023-01292",
"Impact": "High",
"Public": "20230219"
},
{
"ID": "BDU:2023-01298",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://bdu.fstec.ru/vul/2023-01298",
"Impact": "High",
"Public": "20230303"
},
{
"ID": "BDU:2023-01299",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-440",
"Href": "https://bdu.fstec.ru/vul/2023-01299",
"Impact": "Low",
"Public": "20221024"
},
{
"ID": "BDU:2023-01301",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01301",
"Impact": "Low",
"Public": "20220831"
},
{
"ID": "BDU:2023-01492",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-252, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01492",
"Impact": "High",
"Public": "20230301"
},
{
"ID": "BDU:2023-01745",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-590, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-01745",
"Impact": "High",
"Public": "20220930"
},
{
"ID": "BDU:2023-01957",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01957",
"Impact": "High",
"Public": "20220518"
},
{
"ID": "BDU:2023-02164",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02164",
"Impact": "High",
"Public": "20220407"
},
{
"ID": "BDU:2023-02348",
"CVSS": "AV:L/AC:H/Au:M/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-59, CWE-911",
"Href": "https://bdu.fstec.ru/vul/2023-02348",
"Impact": "Low",
"Public": "20220729"
},
{
"ID": "BDU:2023-02363",
"CVSS": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287, CWE-302",
"Href": "https://bdu.fstec.ru/vul/2023-02363",
"Impact": "Low",
"Public": "20220531"
},
{
"ID": "BDU:2023-02397",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-125, CWE-129",
"Href": "https://bdu.fstec.ru/vul/2023-02397",
"Impact": "High",
"Public": "20230414"
},
{
"ID": "BDU:2023-02408",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-367, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2023-02408",
"Impact": "High",
"Public": "20220401"
},
{
"ID": "BDU:2023-02515",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-203, CWE-264, CWE-385, CWE-476, CWE-514",
"Href": "https://bdu.fstec.ru/vul/2023-02515",
"Impact": "Low",
"Public": "20230121"
},
{
"ID": "BDU:2023-02525",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-02525",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "BDU:2023-02527",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-02527",
"Impact": "Low",
"Public": "20221207"
},
{
"ID": "BDU:2023-02604",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2023-02604",
"Impact": "High",
"Public": "20220114"
},
{
"ID": "BDU:2023-02624",
"CVSS": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02624",
"Impact": "Low",
"Public": "20230130"
},
{
"ID": "BDU:2023-02628",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02628",
"Impact": "Low",
"Public": "20220802"
},
{
"ID": "BDU:2023-02634",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-02634",
"Impact": "Low",
"Public": "20220525"
},
{
"ID": "BDU:2023-02738",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-662",
"Href": "https://bdu.fstec.ru/vul/2023-02738",
"Impact": "Low",
"Public": "20220608"
},
{
"ID": "BDU:2023-03163",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03163",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "BDU:2023-03171",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03171",
"Impact": "High",
"Public": "20220425"
}
],
"CVEs": [
{
"ID": "CVE-2020-35501",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
"Impact": "Low",
"Public": "20220330"
},
{
"ID": "CVE-2021-33655",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33655",
"Impact": "Low",
"Public": "20220718"
},
{
"ID": "CVE-2021-3743",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"Impact": "High",
"Public": "20220304"
},
{
"ID": "CVE-2021-3847",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
"Impact": "High",
"Public": "20220401"
},
{
"ID": "CVE-2021-4002",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"Impact": "Low",
"Public": "20220303"
},
{
"ID": "CVE-2021-4090",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
"Impact": "High",
"Public": "20220218"
},
{
"ID": "CVE-2021-4095",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
"Impact": "Low",
"Public": "20220310"
},
{
"ID": "CVE-2021-4135",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
"Impact": "Low",
"Public": "20220714"
},
{
"ID": "CVE-2021-4155",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-131",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"Impact": "Low",
"Public": "20220824"
},
{
"ID": "CVE-2021-4202",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
"Impact": "High",
"Public": "20220325"
},
{
"ID": "CVE-2021-44879",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
"Impact": "Low",
"Public": "20220214"
},
{
"ID": "CVE-2021-45402",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
"Impact": "Low",
"Public": "20220211"
},
{
"ID": "CVE-2022-0168",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168",
"Impact": "Low",
"Public": "20220826"
},
{
"ID": "CVE-2022-0171",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-212",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0171",
"Impact": "Low",
"Public": "20220826"
},
{
"ID": "CVE-2022-0264",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
"Impact": "Low",
"Public": "20220204"
},
{
"ID": "CVE-2022-0330",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"Impact": "High",
"Public": "20220325"
},
{
"ID": "CVE-2022-0382",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382",
"Impact": "Low",
"Public": "20220211"
},
{
"ID": "CVE-2022-0433",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
"Impact": "Low",
"Public": "20220310"
},
{
"ID": "CVE-2022-0494",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494",
"Impact": "Low",
"Public": "20220325"
},
{
"ID": "CVE-2022-0516",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
"Impact": "High",
"Public": "20220310"
},
{
"ID": "CVE-2022-0617",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
"Impact": "Low",
"Public": "20220216"
},
{
"ID": "CVE-2022-0854",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
"Impact": "Low",
"Public": "20220323"
},
{
"ID": "CVE-2022-1011",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"Impact": "High",
"Public": "20220318"
},
{
"ID": "CVE-2022-1012",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"Impact": "High",
"Public": "20220805"
},
{
"ID": "CVE-2022-1015",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015",
"Impact": "Low",
"Public": "20220429"
},
{
"ID": "CVE-2022-1016",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
"Impact": "Low",
"Public": "20220829"
},
{
"ID": "CVE-2022-1048",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
"Impact": "High",
"Public": "20220429"
},
{
"ID": "CVE-2022-1055",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
"Impact": "High",
"Public": "20220329"
},
{
"ID": "CVE-2022-1195",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
"Impact": "Low",
"Public": "20220429"
},
{
"ID": "CVE-2022-1198",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198",
"Impact": "Low",
"Public": "20220829"
},
{
"ID": "CVE-2022-1199",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1199",
"Impact": "High",
"Public": "20220829"
},
{
"ID": "CVE-2022-1204",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204",
"Impact": "Low",
"Public": "20220829"
},
{
"ID": "CVE-2022-1205",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205",
"Impact": "Low",
"Public": "20220831"
},
{
"ID": "CVE-2022-1263",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263",
"Impact": "Low",
"Public": "20220831"
},
{
"ID": "CVE-2022-1353",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
"Impact": "High",
"Public": "20220429"
},
{
"ID": "CVE-2022-1651",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1651",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1671",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1671",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "CVE-2022-1734",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1734",
"Impact": "High",
"Public": "20220518"
},
{
"ID": "CVE-2022-1852",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852",
"Impact": "Low",
"Public": "20220630"
},
{
"ID": "CVE-2022-1973",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1973",
"Impact": "High",
"Public": "20220805"
},
{
"ID": "CVE-2022-2078",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-121",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078",
"Impact": "Low",
"Public": "20220630"
},
{
"ID": "CVE-2022-2153",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153",
"Impact": "Low",
"Public": "20220831"
},
{
"ID": "CVE-2022-2318",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2318",
"Impact": "Low",
"Public": "20220706"
},
{
"ID": "CVE-2022-2380",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2380",
"Impact": "Low",
"Public": "20220713"
},
{
"ID": "CVE-2022-24448",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
"Impact": "Low",
"Public": "20220204"
},
{
"ID": "CVE-2022-24958",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-763",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "CVE-2022-24959",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959",
"Impact": "Low",
"Public": "20220211"
},
{
"ID": "CVE-2022-2503",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503",
"Impact": "Low",
"Public": "20220812"
},
{
"ID": "CVE-2022-25258",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258",
"Impact": "Low",
"Public": "20220216"
},
{
"ID": "CVE-2022-25265",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-913",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
"Impact": "High",
"Public": "20220216"
},
{
"ID": "CVE-2022-25375",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-1284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375",
"Impact": "Low",
"Public": "20220220"
},
{
"ID": "CVE-2022-26490",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490",
"Impact": "High",
"Public": "20220306"
},
{
"ID": "CVE-2022-26878",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
"Impact": "Low",
"Public": "20220311"
},
{
"ID": "CVE-2022-26966",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966",
"Impact": "Low",
"Public": "20220312"
},
{
"ID": "CVE-2022-27223",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-129",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223",
"Impact": "High",
"Public": "20220316"
},
{
"ID": "CVE-2022-27666",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"Impact": "High",
"Public": "20220323"
},
{
"ID": "CVE-2022-27950",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
"Impact": "Low",
"Public": "20220328"
},
{
"ID": "CVE-2022-28356",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356",
"Impact": "Low",
"Public": "20220402"
},
{
"ID": "CVE-2022-28388",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388",
"Impact": "Low",
"Public": "20220403"
},
{
"ID": "CVE-2022-28389",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28389",
"Impact": "Low",
"Public": "20220403"
},
{
"ID": "CVE-2022-28390",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390",
"Impact": "High",
"Public": "20220403"
},
{
"ID": "CVE-2022-2873",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-131",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873",
"Impact": "Low",
"Public": "20220822"
},
{
"ID": "CVE-2022-28796",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796",
"Impact": "High",
"Public": "20220408"
},
{
"ID": "CVE-2022-2905",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2905",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "CVE-2022-29582",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29582",
"Impact": "High",
"Public": "20220422"
},
{
"ID": "CVE-2022-2961",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2961",
"Impact": "High",
"Public": "20220829"
},
{
"ID": "CVE-2022-29968",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968",
"Impact": "High",
"Public": "20220502"
},
{
"ID": "CVE-2022-3077",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "CVE-2022-3078",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3078",
"Impact": "Low",
"Public": "20220901"
},
{
"ID": "CVE-2022-3104",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3105",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3106",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3107",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3108",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-252",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3110",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3111",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3112",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3113",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3114",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3115",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3202",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3202",
"Impact": "High",
"Public": "20220914"
},
{
"ID": "CVE-2022-32296",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296",
"Impact": "Low",
"Public": "20220605"
},
{
"ID": "CVE-2022-32981",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32981",
"Impact": "High",
"Public": "20220610"
},
{
"ID": "CVE-2022-3303",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3303",
"Impact": "Low",
"Public": "20220927"
},
{
"ID": "CVE-2022-3344",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-440",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3344",
"Impact": "Low",
"Public": "20221025"
},
{
"ID": "CVE-2022-33743",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743",
"Impact": "High",
"Public": "20220705"
},
{
"ID": "CVE-2022-33744",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33744",
"Impact": "Low",
"Public": "20220705"
},
{
"ID": "CVE-2022-33981",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33981",
"Impact": "Low",
"Public": "20220618"
},
{
"ID": "CVE-2022-34494",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34494",
"Impact": "Low",
"Public": "20220626"
},
{
"ID": "CVE-2022-34495",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34495",
"Impact": "Low",
"Public": "20220626"
},
{
"ID": "CVE-2022-3521",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3521",
"Impact": "Low",
"Public": "20221016"
},
{
"ID": "CVE-2022-3543",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3543",
"Impact": "Low",
"Public": "20221017"
},
{
"ID": "CVE-2022-3544",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3544",
"Impact": "Low",
"Public": "20221017"
},
{
"ID": "CVE-2022-3586",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3586",
"Impact": "Low",
"Public": "20221019"
},
{
"ID": "CVE-2022-3594",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594",
"Impact": "Low",
"Public": "20221018"
},
{
"ID": "CVE-2022-3595",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595",
"Impact": "Low",
"Public": "20221018"
},
{
"ID": "CVE-2022-36123",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36123",
"Impact": "High",
"Public": "20220729"
},
{
"ID": "CVE-2022-36879",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879",
"Impact": "Low",
"Public": "20220727"
},
{
"ID": "CVE-2022-3707",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
"Impact": "Low",
"Public": "20230306"
},
{
"ID": "CVE-2022-38457",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38457",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "CVE-2022-39188",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188",
"Impact": "Low",
"Public": "20220902"
},
{
"ID": "CVE-2022-39189",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189",
"Impact": "High",
"Public": "20220902"
},
{
"ID": "CVE-2022-39190",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39190",
"Impact": "Low",
"Public": "20220902"
},
{
"ID": "CVE-2022-39842",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39842",
"Impact": "Low",
"Public": "20220905"
},
{
"ID": "CVE-2022-40133",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40133",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "CVE-2022-40307",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40307",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "CVE-2022-40768",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40768",
"Impact": "Low",
"Public": "20220918"
},
{
"ID": "CVE-2022-41218",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218",
"Impact": "Low",
"Public": "20220921"
},
{
"ID": "CVE-2022-4127",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4127",
"Impact": "Low",
"Public": "20221128"
},
{
"ID": "CVE-2022-41848",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41848",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "CVE-2022-41849",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41849",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "CVE-2022-41850",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41850",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "CVE-2022-42328",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42328",
"Impact": "Low",
"Public": "20221207"
},
{
"ID": "CVE-2022-42329",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42329",
"Impact": "Low",
"Public": "20221207"
},
{
"ID": "CVE-2022-42703",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703",
"Impact": "Low",
"Public": "20221009"
},
{
"ID": "CVE-2022-42721",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
"Impact": "Low",
"Public": "20221014"
},
{
"ID": "CVE-2022-42722",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
"Impact": "Low",
"Public": "20221014"
},
{
"ID": "CVE-2022-43945",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945",
"Impact": "High",
"Public": "20221104"
},
{
"ID": "CVE-2022-44032",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44032",
"Impact": "Low",
"Public": "20221030"
},
{
"ID": "CVE-2022-44033",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44033",
"Impact": "Low",
"Public": "20221030"
},
{
"ID": "CVE-2022-44034",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44034",
"Impact": "Low",
"Public": "20221030"
},
{
"ID": "CVE-2022-45869",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45869",
"Impact": "Low",
"Public": "20221130"
},
{
"ID": "CVE-2022-45884",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45884",
"Impact": "High",
"Public": "20221125"
},
{
"ID": "CVE-2022-45885",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45885",
"Impact": "High",
"Public": "20221125"
},
{
"ID": "CVE-2022-45886",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45886",
"Impact": "High",
"Public": "20221125"
},
{
"ID": "CVE-2022-45887",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45887",
"Impact": "Low",
"Public": "20221125"
},
{
"ID": "CVE-2022-45888",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45888",
"Impact": "Low",
"Public": "20221125"
},
{
"ID": "CVE-2022-45919",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45919",
"Impact": "High",
"Public": "20221127"
},
{
"ID": "CVE-2022-4662",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-455",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662",
"Impact": "Low",
"Public": "20221222"
},
{
"ID": "CVE-2022-47520",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47520",
"Impact": "High",
"Public": "20221218"
},
{
"ID": "CVE-2022-47929",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
"Impact": "Low",
"Public": "20230117"
},
{
"ID": "CVE-2022-47938",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47938",
"Impact": "Low",
"Public": "20221223"
},
{
"ID": "CVE-2022-47940",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47940",
"Impact": "High",
"Public": "20221223"
},
{
"ID": "CVE-2022-48423",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-48423",
"Impact": "High",
"Public": "20230319"
},
{
"ID": "CVE-2023-0458",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0458",
"Impact": "Low",
"Public": "20230426"
},
{
"ID": "CVE-2023-0468",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0468",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0469",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0469",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0590",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590",
"Impact": "Low",
"Public": "20230323"
},
{
"ID": "CVE-2023-1095",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095",
"Impact": "Low",
"Public": "20230228"
},
{
"ID": "CVE-2023-1195",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
"Impact": "Low",
"Public": "20230518"
},
{
"ID": "CVE-2023-1249",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1249",
"Impact": "Low",
"Public": "20230323"
},
{
"ID": "CVE-2023-1382",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382",
"Impact": "Low",
"Public": "20230419"
},
{
"ID": "CVE-2023-1838",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1838",
"Impact": "High",
"Public": "20230405"
},
{
"ID": "CVE-2023-1872",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872",
"Impact": "High",
"Public": "20230412"
},
{
"ID": "CVE-2023-2006",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2006",
"Impact": "High",
"Public": "20230424"
},
{
"ID": "CVE-2023-2007",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2007",
"Impact": "High",
"Public": "20230424"
},
{
"ID": "CVE-2023-2008",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-129",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2008",
"Impact": "High",
"Public": "20230414"
},
{
"ID": "CVE-2023-2019",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2019",
"Impact": "Low",
"Public": "20230424"
},
{
"ID": "CVE-2023-2166",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2166",
"Impact": "Low",
"Public": "20230419"
},
{
"ID": "CVE-2023-2177",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177",
"Impact": "Low",
"Public": "20230420"
},
{
"ID": "CVE-2023-22995",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995",
"Impact": "High",
"Public": "20230228"
},
{
"ID": "CVE-2023-22996",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22996",
"Impact": "Low",
"Public": "20230228"
},
{
"ID": "CVE-2023-22997",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22997",
"Impact": "Low",
"Public": "20230228"
},
{
"ID": "CVE-2023-22998",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-436",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
"Impact": "Low",
"Public": "20230228"
},
{
"ID": "CVE-2023-22999",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
"Impact": "Low",
"Public": "20230228"
},
{
"ID": "CVE-2023-23000",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000",
"Impact": "Low",
"Public": "20230301"
},
{
"ID": "CVE-2023-23001",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
"Impact": "Low",
"Public": "20230301"
},
{
"ID": "CVE-2023-23002",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
"Impact": "Low",
"Public": "20230301"
},
{
"ID": "CVE-2023-23003",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-252",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
"Impact": "Low",
"Public": "20230301"
},
{
"ID": "CVE-2023-23004",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23004",
"Impact": "Low",
"Public": "20230301"
},
{
"ID": "CVE-2023-23454",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
"Impact": "Low",
"Public": "20230112"
},
{
"ID": "CVE-2023-23455",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23455",
"Impact": "Low",
"Public": "20230112"
},
{
"ID": "CVE-2023-23559",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23559",
"Impact": "High",
"Public": "20230113"
},
{
"ID": "CVE-2023-25012",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25012",
"Impact": "Low",
"Public": "20230202"
},
{
"ID": "CVE-2023-2513",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513",
"Impact": "Low",
"Public": "20230508"
},
{
"ID": "CVE-2023-26242",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26242",
"Impact": "High",
"Public": "20230221"
},
{
"ID": "CVE-2023-26545",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26545",
"Impact": "Low",
"Public": "20230225"
},
{
"ID": "CVE-2023-28327",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28327",
"Impact": "Low",
"Public": "20230419"
},
{
"ID": "CVE-2023-3111",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3111",
"Impact": "High",
"Public": "20230605"
},
{
"ID": "CVE-2023-3159",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3159",
"Impact": "Low",
"Public": "20230612"
},
{
"ID": "CVE-2023-32269",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32269",
"Impact": "Low",
"Public": "20230505"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20231741001",
"Comment": "kernel-doc-un is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741003",
"Comment": "kernel-headers-un-def is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741004",
"Comment": "kernel-image-domU-un-def is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741005",
"Comment": "kernel-image-un-def is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741006",
"Comment": "kernel-image-un-def-checkinstall is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741007",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741008",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:6.1.26-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231741010",
"Comment": "kernel-modules-staging-un-def is earlier than 1:6.1.26-alt1"
}
]
}
]
}
}
]
}