vuln-list-alt/oval/c10f1/ALT-PU-2022-2426/definitions.json
2024-06-28 13:17:52 +00:00

153 lines
6.4 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222426",
"Version": "oval:org.altlinux.errata:def:20222426",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2426: package `kernel-image-rt` update to version 5.10.131-alt2.rt72",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2426",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2426",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-04733",
"RefURL": "https://bdu.fstec.ru/vul/2022-04733",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05829",
"RefURL": "https://bdu.fstec.ru/vul/2022-05829",
"Source": "BDU"
},
{
"RefID": "CVE-2021-33656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33656",
"Source": "CVE"
},
{
"RefID": "CVE-2022-34918",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3577",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3577",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rt to version 5.10.131-alt2.rt72. \nSecurity Fix(es):\n\n * BDU:2022-04733: Уязвимость функция nft_set_elem_init файла net/netfilter/nf_tables_api.c компонента User Namespace Handler ядра операционной системы Linux, позволяющая нарушителю получить root доступ\n\n * BDU:2022-05829: Уязвимость ioctl cmd PIO_FONT ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями\n\n * CVE-2021-33656: When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.\n\n * CVE-2022-34918: An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.\n\n * CVE-2022-3577: An out-of-bounds memory write flaw was found in the Linux kernels Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-08-12"
},
"Updated": {
"Date": "2022-08-12"
},
"BDUs": [
{
"ID": "BDU:2022-04733",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-04733",
"Impact": "High",
"Public": "20220703"
},
{
"ID": "BDU:2022-05829",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05829",
"Impact": "High",
"Public": "20220817"
}
],
"CVEs": [
{
"ID": "CVE-2021-33656",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33656",
"Impact": "Low",
"Public": "20220718"
},
{
"ID": "CVE-2022-34918",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918",
"Impact": "High",
"Public": "20220704"
},
{
"ID": "CVE-2022-3577",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3577",
"Impact": "High",
"Public": "20221020"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222426001",
"Comment": "kernel-headers-modules-rt is earlier than 0:5.10.131-alt2.rt72"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222426002",
"Comment": "kernel-headers-rt is earlier than 0:5.10.131-alt2.rt72"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222426003",
"Comment": "kernel-image-rt is earlier than 0:5.10.131-alt2.rt72"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222426004",
"Comment": "kernel-image-rt-checkinstall is earlier than 0:5.10.131-alt2.rt72"
}
]
}
]
}
}
]
}