666 lines
34 KiB
JSON
666 lines
34 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20222742",
|
||
"Version": "oval:org.altlinux.errata:def:20222742",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2022-2742: package `chromium` update to version 106.0.5249.61-alt0.p10.1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2022-2742",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2742",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06270",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06270",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06320",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06320",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06321",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06321",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06322",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06322",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06323",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06323",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06324",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06324",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06372",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06372",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06521",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06521",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06527",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06527",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06528",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06528",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06529",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06529",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06530",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06530",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06531",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06531",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06532",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06532",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06533",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06533",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06534",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06534",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06535",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06535",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06536",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06536",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06537",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06537",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06538",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06538",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06539",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06539",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3195",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3195",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3196",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3196",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3197",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3197",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3198",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3198",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3199",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3199",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3200",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3200",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3201",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3201",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3304",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3304",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3305",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3305",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3306",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3306",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3307",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3307",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3308",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3308",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3309",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3309",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3310",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3310",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3311",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3311",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3312",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3312",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3313",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3313",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3314",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3314",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3315",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3315",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3316",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3316",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3317",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3317",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3318",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3318",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3842",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3842",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades chromium to version 106.0.5249.61-alt0.p10.1. \nSecurity Fix(es):\n\n * BDU:2022-06270: Уязвимость компонента Notifications (Уведомления) браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2022-06320: Уязвимость расширения VPN браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06321: Уязвимость пользовательского интерфейса браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-06322: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06323: Уязвимость службы Safe Browsing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06324: Уязвимость механизма отображения веб-страниц Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06372: Уязвимость функции Intents браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06521: Уязвимость компонента Media браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06527: Уязвимость набора инструментов для веб-разработчиков Developer Tools браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти существующие ограничения безопасности и раскрыть защищаемую информацию\n\n * BDU:2022-06528: Уязвимость реализации функции импорта браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06529: Уязвимость компонента PDFium браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06530: Уязвимость компонента PDFium браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06531: Уязвимость браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06532: Уязвимость компонента Internals браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06533: Уязвимость набора инструментов для веб-разработчиков Developer Tools веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06534: Уязвимость компонента Assistant веб-браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-06535: Уязвимость компонента Frames браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06536: Уязвимость хранилища Storage браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-06537: Уязвимость компонента Survey операционной системы Chrome OS, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06538: Уязвимость пользовательских вкладок браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти существующие ограничения безопасности и раскрыть защищаемую информацию\n\n * BDU:2022-06539: Уязвимость компонента Survey веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2022-3195: Out of bounds write in Storage in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3196: Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)\n\n * CVE-2022-3197: Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)\n\n * CVE-2022-3198: Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)\n\n * CVE-2022-3199: Use after free in Frames in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3200: Heap buffer overflow in Internals in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3201: Insufficient validation of untrusted input in DevTools in Google Chrome on Chrome OS prior to 105.0.5195.125 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3304: Use after free in CSS in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3305: Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3306: Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3307: Use after free in media in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\n\n * CVE-2022-3308: Insufficient policy enforcement in developer tools in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3309: Use after free in assistant in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: Medium)\n\n * CVE-2022-3310: Insufficient policy enforcement in custom tabs in Google Chrome on Android prior to 106.0.5249.62 allowed an attacker who convinced the user to install an application to bypass same origin policy via a crafted application. (Chromium security severity: Medium)\n\n * CVE-2022-3311: Use after free in import in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3312: Insufficient validation of untrusted input in VPN in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a local attacker to bypass managed device restrictions via physical access to the device. (Chromium security severity: Medium)\n\n * CVE-2022-3313: Incorrect security UI in full screen in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3314: Use after free in logging in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)\n\n * CVE-2022-3315: Type confusion in Blink in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2022-3316: Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass security feature via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2022-3317: Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)\n\n * CVE-2022-3318: Use after free in ChromeOS Notifications in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to reboot Chrome OS to potentially exploit heap corruption via UI interaction. (Chromium security severity: Low)\n\n * CVE-2022-3842: Use after free in Passwords in Google Chrome prior to 105.0.5195.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2022-10-07"
|
||
},
|
||
"Updated": {
|
||
"Date": "2022-10-07"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-06270",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06270",
|
||
"Impact": "Low",
|
||
"Public": "20220422"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06320",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06320",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06321",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
|
||
"CWE": "CWE-451",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06321",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06322",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06322",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06323",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06323",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06324",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06324",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06372",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06372",
|
||
"Impact": "Low",
|
||
"Public": "20220224"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06521",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06521",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06527",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06527",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06528",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06528",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06529",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06529",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06530",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06530",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06531",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06531",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06532",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06532",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06533",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06533",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06534",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06534",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06535",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06535",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06536",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06536",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06537",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06537",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06538",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06538",
|
||
"Impact": "Low",
|
||
"Public": "20220927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06539",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06539",
|
||
"Impact": "High",
|
||
"Public": "20220927"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2022-3195",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3195",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3196",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3196",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3197",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3197",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3198",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3198",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3199",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3199",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3200",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3200",
|
||
"Impact": "High",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3201",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3201",
|
||
"Impact": "Low",
|
||
"Public": "20220926"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3304",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3304",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3305",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3305",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3306",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3306",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3307",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3307",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3308",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3308",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3309",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3309",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3310",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3310",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3311",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3311",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3312",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-306",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3312",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3313",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3313",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3314",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3314",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3315",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3315",
|
||
"Impact": "High",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3316",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3316",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3317",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3317",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3318",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3318",
|
||
"Impact": "Low",
|
||
"Public": "20221101"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3842",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3842",
|
||
"Impact": "High",
|
||
"Public": "20230102"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20222742001",
|
||
"Comment": "chromium is earlier than 0:106.0.5249.61-alt0.p10.1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |