vuln-list-alt/oval/c10f1/ALT-PU-2022-2635/definitions.json
2024-06-28 13:17:52 +00:00

220 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222635",
"Version": "oval:org.altlinux.errata:def:20222635",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2635: package `kernel-image-rt` update to version 5.10.140-alt1.rt73",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2635",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2635",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-04686",
"RefURL": "https://bdu.fstec.ru/vul/2022-04686",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06616",
"RefURL": "https://bdu.fstec.ru/vul/2022-06616",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07365",
"RefURL": "https://bdu.fstec.ru/vul/2022-07365",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01797",
"RefURL": "https://bdu.fstec.ru/vul/2023-01797",
"Source": "BDU"
},
{
"RefID": "CVE-2022-1882",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3028",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3625",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3635",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3635",
"Source": "CVE"
},
{
"RefID": "CVE-2022-36946",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36946",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4744",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4744",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rt to version 5.10.140-alt1.rt73. \nSecurity Fix(es):\n\n * BDU:2022-04686: Уязвимость модуля nfnetlink_queue ядра операционных систем Linux, связанная с некорректной обработкой вердиктов с однобайтным атрибутом nfta_payload, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06616: Уязвимость функции devlink_param_set/devlink_param_get (net/core/devlink.c) компонента IPsec ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07365: Уязвимость подсистемы XFRM ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код, вызвать отказ в обслуживании или оказать другое воздействие на систему\n\n * BDU:2023-01797: Уязвимость функции tun_free_netdev() виртуальных сетевых драйверов TUN/TAP ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * CVE-2022-1882: A use-after-free flaw was found in the Linux kernels pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-3028: A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.\n\n * CVE-2022-3625: A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.\n\n * CVE-2022-3635: A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.\n\n * CVE-2022-36946: nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.\n\n * CVE-2022-4744: A double-free flaw was found in the Linux kernels TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-09-19"
},
"Updated": {
"Date": "2022-09-19"
},
"BDUs": [
{
"ID": "BDU:2022-04686",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-04686",
"Impact": "High",
"Public": "20220726"
},
{
"ID": "BDU:2022-06616",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06616",
"Impact": "High",
"Public": "20220810"
},
{
"ID": "BDU:2022-07365",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125, CWE-362, CWE-667, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-07365",
"Impact": "High",
"Public": "20220805"
},
{
"ID": "BDU:2023-01797",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415, CWE-460, CWE-824",
"Href": "https://bdu.fstec.ru/vul/2023-01797",
"Impact": "High",
"Public": "20211217"
}
],
"CVEs": [
{
"ID": "CVE-2022-1882",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882",
"Impact": "High",
"Public": "20220526"
},
{
"ID": "CVE-2022-3028",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028",
"Impact": "High",
"Public": "20220831"
},
{
"ID": "CVE-2022-3625",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625",
"Impact": "High",
"Public": "20221021"
},
{
"ID": "CVE-2022-3635",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3635",
"Impact": "High",
"Public": "20221021"
},
{
"ID": "CVE-2022-36946",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36946",
"Impact": "High",
"Public": "20220727"
},
{
"ID": "CVE-2022-4744",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4744",
"Impact": "High",
"Public": "20230330"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222635001",
"Comment": "kernel-headers-modules-rt is earlier than 0:5.10.140-alt1.rt73"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222635002",
"Comment": "kernel-headers-rt is earlier than 0:5.10.140-alt1.rt73"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222635003",
"Comment": "kernel-image-rt is earlier than 0:5.10.140-alt1.rt73"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222635004",
"Comment": "kernel-image-rt-checkinstall is earlier than 0:5.10.140-alt1.rt73"
}
]
}
]
}
}
]
}