vuln-list-alt/oval/c10f1/ALT-PU-2021-2284/definitions.json
2024-06-28 13:17:52 +00:00

498 lines
26 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20212284",
"Version": "oval:org.altlinux.errata:def:20212284",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-2284: package `kernel-image-mp` update to version 5.13.4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-2284",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2284",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-03233",
"RefURL": "https://bdu.fstec.ru/vul/2021-03233",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03848",
"RefURL": "https://bdu.fstec.ru/vul/2021-03848",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04561",
"RefURL": "https://bdu.fstec.ru/vul/2021-04561",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04710",
"RefURL": "https://bdu.fstec.ru/vul/2021-04710",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04711",
"RefURL": "https://bdu.fstec.ru/vul/2021-04711",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04846",
"RefURL": "https://bdu.fstec.ru/vul/2021-04846",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04848",
"RefURL": "https://bdu.fstec.ru/vul/2021-04848",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04852",
"RefURL": "https://bdu.fstec.ru/vul/2021-04852",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04864",
"RefURL": "https://bdu.fstec.ru/vul/2021-04864",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05198",
"RefURL": "https://bdu.fstec.ru/vul/2021-05198",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00595",
"RefURL": "https://bdu.fstec.ru/vul/2022-00595",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05655",
"RefURL": "https://bdu.fstec.ru/vul/2022-05655",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05676",
"RefURL": "https://bdu.fstec.ru/vul/2022-05676",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06017",
"RefURL": "https://bdu.fstec.ru/vul/2022-06017",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01796",
"RefURL": "https://bdu.fstec.ru/vul/2023-01796",
"Source": "BDU"
},
{
"RefID": "CVE-2020-26558",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26558",
"Source": "CVE"
},
{
"RefID": "CVE-2021-33909",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3573",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38160",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38199",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38199",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38201",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38201",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38202",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38202",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38203",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38203",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38205",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38205",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4154",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4154",
"Source": "CVE"
},
{
"RefID": "CVE-2021-45485",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"Source": "CVE"
},
{
"RefID": "CVE-2022-36280",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41222",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28772",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28772",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.13.4-alt1. \nSecurity Fix(es):\n\n * BDU:2021-03233: Уязвимость реализации протокола CAN BCM ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-03848: Уязвимость компонента fs/seq_file.c ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-04561: Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04710: Уязвимость функции strlen компонента fs/nfsd/trace.h ядра операционной системы Linux, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04711: Уязвимость функции xdr_set_page_base компонента net/sunrpc/xdr.c ядра операционной системы Linux, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04846: Уязвимость функции hci_sock_bound_ioctl () подсистемы HCI ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код в контексте ядра\n\n * BDU:2021-04848: Уязвимость драйвера drivers/char/virtio_console.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение стека\n\n * BDU:2021-04852: Уязвимость компонента drivers/net/ethernet/xilinx/xilinx_emaclite.c ядра операционной системы Linux, позволяющая нарушителю взломать механизм защиты ASLR\n\n * BDU:2021-04864: Уязвимость реализации btrfs операционной системы Linux связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05198: Уязвимость спецификации Bluetooth Core Specification ядра операционной системы Linux, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-00595: Уязвимость реализации протокола IPv6 ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-05655: Уязвимость драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_kms.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05676: Уязвимость функции cgroup1_parse_param компонента kernel/cgroup/cgroup-v1.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-06017: Уязвимость реализации функции take_rmap_locks() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01796: Уязвимость функции seq_buf_putmem_hex() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.\n\n * CVE-2021-33909: fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.\n\n * CVE-2021-3573: A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.\n\n * CVE-2021-3609: .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.\n\n * CVE-2021-38160: In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior\n\n * CVE-2021-38199: fs/nfs/nfs4client.c in the Linux kernel before 5.13.4 has incorrect connection-setup ordering, which allows operators of remote NFSv4 servers to cause a denial of service (hanging of mounts) by arranging for those servers to be unreachable during trunking detection.\n\n * CVE-2021-38201: net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.\n\n * CVE-2021-38202: fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.\n\n * CVE-2021-38203: btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info.\n\n * CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).\n\n * CVE-2021-4154: A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.\n\n * CVE-2021-45485: In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.\n\n * CVE-2022-36280: An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-41222: mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.\n\n * CVE-2023-28772: An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-07-20"
},
"Updated": {
"Date": "2021-07-20"
},
"BDUs": [
{
"ID": "BDU:2021-03233",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2021-03233",
"Impact": "High",
"Public": "20210619"
},
{
"ID": "BDU:2021-03848",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-03848",
"Impact": "High",
"Public": "20210719"
},
{
"ID": "BDU:2021-04561",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-665",
"Href": "https://bdu.fstec.ru/vul/2021-04561",
"Impact": "Low",
"Public": "20210613"
},
{
"ID": "BDU:2021-04710",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-04710",
"Impact": "High",
"Public": "20210706"
},
{
"ID": "BDU:2021-04711",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04711",
"Impact": "High",
"Public": "20210613"
},
{
"ID": "BDU:2021-04846",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04846",
"Impact": "Low",
"Public": "20210531"
},
{
"ID": "BDU:2021-04848",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2021-04848",
"Impact": "High",
"Public": "20210703"
},
{
"ID": "BDU:2021-04852",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-824",
"Href": "https://bdu.fstec.ru/vul/2021-04852",
"Impact": "Low",
"Public": "20210521"
},
{
"ID": "BDU:2021-04864",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667, CWE-770",
"Href": "https://bdu.fstec.ru/vul/2021-04864",
"Impact": "Low",
"Public": "20210707"
},
{
"ID": "BDU:2021-05198",
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-287",
"Href": "https://bdu.fstec.ru/vul/2021-05198",
"Impact": "Low",
"Public": "20210608"
},
{
"ID": "BDU:2022-00595",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-327",
"Href": "https://bdu.fstec.ru/vul/2022-00595",
"Impact": "High",
"Public": "20210531"
},
{
"ID": "BDU:2022-05655",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"CWE": "CWE-120, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05655",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "BDU:2022-05676",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05676",
"Impact": "High",
"Public": "20210714"
},
{
"ID": "BDU:2022-06017",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06017",
"Impact": "Low",
"Public": "20210708"
},
{
"ID": "BDU:2023-01796",
"CVSS": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2023-01796",
"Impact": "Low",
"Public": "20230323"
}
],
"CVEs": [
{
"ID": "CVE-2020-26558",
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26558",
"Impact": "Low",
"Public": "20210524"
},
{
"ID": "CVE-2021-33909",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"Impact": "High",
"Public": "20210720"
},
{
"ID": "CVE-2021-3573",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"Impact": "Low",
"Public": "20210813"
},
{
"ID": "CVE-2021-3609",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"Impact": "High",
"Public": "20220303"
},
{
"ID": "CVE-2021-38160",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38160",
"Impact": "High",
"Public": "20210807"
},
{
"ID": "CVE-2021-38199",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38199",
"Impact": "Low",
"Public": "20210808"
},
{
"ID": "CVE-2021-38201",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38201",
"Impact": "High",
"Public": "20210808"
},
{
"ID": "CVE-2021-38202",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38202",
"Impact": "High",
"Public": "20210808"
},
{
"ID": "CVE-2021-38203",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38203",
"Impact": "Low",
"Public": "20210808"
},
{
"ID": "CVE-2021-38205",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-824",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38205",
"Impact": "Low",
"Public": "20210808"
},
{
"ID": "CVE-2021-4154",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4154",
"Impact": "High",
"Public": "20220204"
},
{
"ID": "CVE-2021-45485",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-327",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"Impact": "High",
"Public": "20211225"
},
{
"ID": "CVE-2022-36280",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280",
"Impact": "Low",
"Public": "20220909"
},
{
"ID": "CVE-2022-41222",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
"Impact": "High",
"Public": "20220921"
},
{
"ID": "CVE-2023-28772",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28772",
"Impact": "Low",
"Public": "20230323"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20212284001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.13.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212284002",
"Comment": "kernel-headers-mp is earlier than 0:5.13.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212284003",
"Comment": "kernel-image-mp is earlier than 0:5.13.4-alt1"
}
]
}
]
}
}
]
}