3021 lines
164 KiB
JSON
3021 lines
164 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20222155",
|
||
"Version": "oval:org.altlinux.errata:def:20222155",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2022-2155: package `kernel-image-rpi-un` update to version 5.18.7-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p10"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2022-2155",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2155",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00622",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00622",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00790",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00790",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00822",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00822",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00823",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00823",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00833",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00833",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00888",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00888",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00889",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00889",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00891",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00891",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00899",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00899",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01249",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01249",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01499",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01499",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01567",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01567",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01597",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01597",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01629",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01629",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01630",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01630",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01644",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01644",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02112",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02112",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02325",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02325",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02328",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02328",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02361",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02361",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02362",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02362",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02387",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02387",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02443",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02443",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02672",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02672",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02677",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02677",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02681",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02681",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02703",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02703",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02816",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02816",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02817",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02817",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02885",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02885",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02886",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02886",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02999",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02999",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03004",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03004",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03034",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03034",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03059",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03059",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03283",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03283",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03404",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03404",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03409",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03409",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03903",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03903",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03904",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03904",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03921",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03921",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03970",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03970",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03984",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03984",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04052",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04052",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04244",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04244",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04266",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04266",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04271",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04271",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04393",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04393",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04995",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04995",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05010",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05010",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05184",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05184",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05402",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05402",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05411",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05411",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05417",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05417",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05481",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05481",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05692",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05692",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05717",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05717",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05723",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05723",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05777",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05777",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05794",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05794",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05844",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05844",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05852",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05852",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05855",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05855",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05890",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05890",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05997",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05997",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06397",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06397",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06398",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06398",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06399",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06399",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06912",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06912",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07326",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07326",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07327",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07327",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07328",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07328",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07329",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07329",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07330",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07330",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07331",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07331",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07332",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07332",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07333",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07333",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07334",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07334",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07335",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07335",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07336",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07336",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07337",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07337",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07352",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07352",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07353",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07353",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00359",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00359",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00629",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00629",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01191",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01191",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01198",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01198",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01200",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01200",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01208",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01208",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01210",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01210",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01211",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01211",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01212",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01212",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01217",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01217",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01275",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01275",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01298",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01298",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01492",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01492",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02164",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02164",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02532",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02532",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03171",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03171",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35501",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3743",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3847",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4090",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4095",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4135",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4155",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4202",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-44879",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45402",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0168",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0171",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0171",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0264",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0330",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0382",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0433",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0494",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0500",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0500",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0516",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0617",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0854",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0995",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0995",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1011",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1012",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1015",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1016",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1048",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1055",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1158",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1195",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1198",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1199",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1199",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1204",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1205",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1263",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1353",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1651",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1651",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1652",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1652",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1671",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1671",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1734",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1734",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1943",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1943",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2153",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-23222",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-23222",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2380",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2380",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24448",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24958",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24959",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25258",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25265",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25375",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2639",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26490",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26878",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26966",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27223",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27666",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27950",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28356",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28388",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28389",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28389",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28390",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28796",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28893",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28893",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29581",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29581",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29582",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29582",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2959",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2977",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2977",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-29968",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-30594",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3078",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3078",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3104",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3105",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3106",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3107",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3108",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3110",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3111",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3112",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3113",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3114",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3115",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3176",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3176",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3202",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3202",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-32250",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-32296",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3239",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-32981",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32981",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-33743",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-33744",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33744",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-33981",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33981",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34494",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34494",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-34495",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34495",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3526",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3526",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3545",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3577",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3577",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40476",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41858",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4378",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0459",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0461",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1249",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1249",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1872",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22995",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22996",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22996",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22999",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23000",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23003",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3159",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3159",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-rpi-un to version 5.18.7-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00622: Уязвимость подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-00790: Уязвимость реализации функции nfs_atomic_open() ядра операционных систем Linux, позволяющая нарушителю оказать влияние на конфиденциальность данных\n\n * BDU:2022-00822: Уязвимость функции check_alu_op() (kernel/bpf/verifier.c) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00823: Уязвимость компонента drivers/usb/gadget/legacy/inode.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00833: Уязвимость компонента drivers/usb/gadget/legacy/inode.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00888: Уязвимость драйвера drivers/usb/gadget/composite.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00889: Уязвимость подсистемы UDF ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00891: Уязвимость драйвера drivers/usb/gadget/function/rndis.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00899: Уязвимость ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01249: Уязвимость параметра len в файле drivers/net/usb/sr9700.c ядра операционных систем семейства Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2022-01499: Уязвимость реализации функции st21nfca_connectivity_event_received() ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2022-01567: Уязвимость модулей esp4 и esp6 ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01597: Уязвимость компонента watch_queue ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код с привилегиями root\n\n * BDU:2022-01629: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01630: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01644: Уязвимость реализации функции tc_new_tfilter() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-02112: Уязвимость реализации функции xs_xprt_free() системы удаленного вызова процедур Sun RPC (Open Network Computing Remote Procedure Call) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02325: Уязвимость функции gc_data_segment (fs/f2fs/gc.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02328: Уязвимость функции jbd2_journal_wait_updates ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02361: Уязвимость функции smb2_ioctl_query_info() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02362: Уязвимость функции BPF_BTF_LOAD() подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-02387: Уязвимость компонента drivers/hid/hid-elo.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02443: Уязвимость подсистемы прямого доступа к памяти DMA (Direct memory access) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02672: Уязвимость функции ems_usb_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-02677: Уязвимость функции в drivers/bluetooth/virtio_bt.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02681: Уязвимость функции mcba_usb_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-02703: Уязвимость драйвера USB-устройства Xilinx (drivers/usb/gadget/udc/udc-xilinx.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02816: Уязвимость функции pfkey_register ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2022-02817: Уязвимость функции io_rw_init_file ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02885: Уязвимость драйверов drivers/net/hamradio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02886: Уязвимость файла fs/io_uring.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-02999: Уязвимость функции map_get_next_key операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03004: Уязвимость системного вызова PTRACE_SEIZE безопасного режима вычислений seccomp ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-03034: Уязвимость реализации функции get_user_pages_fast() подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-03059: Уязвимость функции u32_change() счетчика ссылок в компоненте net/sched ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии до уровня root\n\n * BDU:2022-03283: Уязвимость функции nft_expr_init программного обеспечения фильтрации пакетов Netfilter ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии до уровня root\n\n * BDU:2022-03400: Уязвимость функции scsi_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03404: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03409: Уязвимость компонента net/llc/af_llc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03903: Уязвимость реализации функций preparse_server_key(), free_preparse_server_key() и destroy_server_key() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03904: Уязвимость реализации функции acrn_dev_ioctl() модуля службы гипервизора ACRN (HSM) ядра операционных систем Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-03921: Уязвимость ядра операционной системы Linux, связанная с недостаточной энтропией, позволяющая нарушителю идентифицировать клиентов\n\n * BDU:2022-03970: Уязвимость функции rpmsg_probe (drivers/rpmsg/virtio_rpmsg_bus.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03984: Уязвимость функции rpmsg_virtio_add_ctrl_dev (drivers/rpmsg/virtio_rpmsg_bus.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04052: Уязвимость компонента drivers/block/floppy.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04244: Уязвимость функции bad_flp_intr ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04266: Уязвимость функции nci_request (net/nfc/nci/core.c) интерфейса контроллера NFC (NCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-04271: Уязвимость кроссплатформенного гипервизора Xen ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04393: Уязвимость функции smtcfb_read() ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию и вызвать отказ в обслуживании\n\n * BDU:2022-04995: Уязвимость функции reserve_sfa_size() модуля openvswitch ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05010: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05184: Уязвимость функции kvm_dirty_ring_push (virt/kvm/dirty_ring.c) подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05402: Уязвимость функции nfcmrvl_nci_unregister_dev() операционной системы Linux , позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05411: Уязвимость функции usb_8dev_start_xmit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05417: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к устройству\n\n * BDU:2022-05481: Уязвимость функции kvm_irq_delivery_to_apic_fast() подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05692: Уязвимость функции shmget() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-05717: Уязвимость звуковой подсистемы ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05723: Уязвимость файловой системы FUSE ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05777: Уязвимость ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2022-05794: Уязвимость функций Signalfd_poll() и binder_poll() ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05844: Уязвимость функции diFree (fs/jfs/inode.c) журналируемой файловой системы (JFS) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2022-05852: Уязвимость реализации прокси-виртуализированных TPM-устройств ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе\n\n * BDU:2022-05855: Уязвимость функции em28xx_usb_probe драйвера video4linux ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-05890: Уязвимость драйвера GPU i915 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05997: Уязвимость компонента fs/io_uring.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06397: Уязвимость драйвера drivers/net/hamradio/6pack.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06398: Уязвимость функции ax25_release() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06399: Уязвимость реализации протокола Amateur Radio AX.25 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06400: Уязвимость реализации протокола Amateur Radio AX.25 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06912: Уязвимость ядра операционной системы Linux, связанная с ошибками при освобождении ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07326: Уязвимость функции _rtw_init_xmit_priv в модуле drivers/staging/r8188eu/core/rtw_xmit.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07327: Уязвимость функции free_charger_irq() в модуле drivers/power/supply/wm8350_power.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07328: Уязвимость функции ef100_update_stats в модуле drivers/net/hyperv/netvsc_drv.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07329: Уязвимость функции kfd_parse_subtype_iolink в модуле drivers/gpu/drm/amd/amdkfd/kfd_crat.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07330: Уязвимость функции ef100_update_stats в модуле drivers/net/ethernet/sfc/ef100_nic.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07331: Уязвимость функции amvdec_set_canvases() в модуле drivers/staging/media/meson/vdec/vdec_helpers.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07332: Уязвимость функции lkdtm_ARRAY_BOUNDS модуля drivers/misc/lkdtm/bugs.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.\n\n * BDU:2022-07333: Уязвимость функции uapi_finalize() в модуле drivers/infiniband/core/uverbs_uapi.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07334: Уязвимость функции imx_register_uart_clocks() в модуле drivers/clk/imx/clk.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07335: Уязвимость функции malidp_crtc_reset() в модуле drivers/gpu/drm/arm/malidp_crtc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07336: Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07337: Уязвимость функции mtk_vcodec_fw_vpu_init() в модуле drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07352: Уязвимость функциональности файловой системы UDF ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07353: Уязвимость функции pipe_resize_ring ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00359: Уязвимость драйвера drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00629: Уязвимость функции sl_tx_timeout() в модуле drivers/net/slip.c драйвера SLIP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01191: Уязвимость драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01198: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) в AMD Secure Encrypted Virtualization (SEV) в модуле virt/kvm/kvm_main.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01200: Уязвимость реализации протокола Upper Level Protocol (ULP) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-01208: Уязвимость функции qmp_get() (drivers/soc/qcom/qcom_aoss.c) драйвера Qualcomm AOSS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01210: Уязвимость функции dwc3_qcom_probe() (drivers/usb/dwc3/dwc3-qcom.c) драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01211: Уязвимость функции tegra_xusb_find_port_node() (drivers/phy/tegra/xusb.c) драйвера NVIDIA Tegra XUSB Pad ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01212: Уязвимость функции ufs_mtk_init_va09_pwr_ctrl() (drivers/scsi/ufs/ufs-mediatek.c) драйвера UFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01217: Уязвимость драйвера drivers/bluetooth/hci_qca.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01275: Уязвимость функции fill_files_note() (fs/binfmt_elf.c) подсистемы поддержки файловых систем ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01298: Уязвимость подсистемы OverlayFS ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-01492: Уязвимость функции expr__ctx_new() (tools/perf/util/expr.c) утилиты perf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * BDU:2023-02164: Уязвимость функции io_file_get_fixed() модуля io_uring/io_uring.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02532: Уязвимость функции _copy_from_user() в модуле lib/usercopy.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2023-03171: Уязвимость драйвере протокола IEEE 1394 (FireWire) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2020-35501: A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem\n\n * CVE-2021-3743: An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3847: An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.\n\n * CVE-2021-4002: A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4090: An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.\n\n * CVE-2021-4095: A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2021-4135: A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4155: A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.\n\n * CVE-2021-4202: A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.\n\n * CVE-2021-44879: In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.\n\n * CVE-2021-45402: The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"\n\n * CVE-2022-0168: A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.\n\n * CVE-2022-0171: A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).\n\n * CVE-2022-0264: A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6\n\n * CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.\n\n * CVE-2022-0382: An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0433: A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0494: A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.\n\n * CVE-2022-0500: A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.\n\n * CVE-2022-0516: A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.\n\n * CVE-2022-0617: A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.\n\n * CVE-2022-0854: A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.\n\n * CVE-2022-0995: An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.\n\n * CVE-2022-1011: A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.\n\n * CVE-2022-1012: A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.\n\n * CVE-2022-1015: A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.\n\n * CVE-2022-1016: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.\n\n * CVE-2022-1048: A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-1055: A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5\n\n * CVE-2022-1158: A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.\n\n * CVE-2022-1195: A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.\n\n * CVE-2022-1198: A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.\n\n * CVE-2022-1199: A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.\n\n * CVE-2022-1204: A use-after-free flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.\n\n * CVE-2022-1205: A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.\n\n * CVE-2022-1263: A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.\n\n * CVE-2022-1353: A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.\n\n * CVE-2022-1651: A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.\n\n * CVE-2022-1652: Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.\n\n * CVE-2022-1671: A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.\n\n * CVE-2022-1734: A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.\n\n * CVE-2022-1943: A flaw out of bounds memory write in the Linux kernel UDF file system functionality was found in the way user triggers some file operation which triggers udf_write_fi(). A local user could use this flaw to crash the system or potentially\n\n * CVE-2022-2153: A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.\n\n * CVE-2022-23222: kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.\n\n * CVE-2022-2380: The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.\n\n * CVE-2022-24448: An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.\n\n * CVE-2022-24958: drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.\n\n * CVE-2022-24959: An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.\n\n * CVE-2022-25258: An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.\n\n * CVE-2022-25265: In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.\n\n * CVE-2022-25375: An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.\n\n * CVE-2022-2639: An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-26490: st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.\n\n * CVE-2022-26878: drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).\n\n * CVE-2022-26966: An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.\n\n * CVE-2022-27223: In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.\n\n * CVE-2022-27666: A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.\n\n * CVE-2022-27950: In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.\n\n * CVE-2022-28356: In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.\n\n * CVE-2022-28388: usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-28389: mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-28390: ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.\n\n * CVE-2022-28796: jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.\n\n * CVE-2022-28893: The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.\n\n * CVE-2022-29581: Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.\n\n * CVE-2022-29582: In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.\n\n * CVE-2022-2959: A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.\n\n * CVE-2022-2977: A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.\n\n * CVE-2022-29968: An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.\n\n * CVE-2022-30594: The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.\n\n * CVE-2022-3078: An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.\n\n * CVE-2022-3104: An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3105: An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().\n\n * CVE-2022-3106: An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().\n\n * CVE-2022-3107: An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.\n\n * CVE-2022-3108: An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().\n\n * CVE-2022-3110: An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.\n\n * CVE-2022-3111: An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().\n\n * CVE-2022-3112: An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3113: An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3114: An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3115: An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3176: There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659\n\n * CVE-2022-3202: A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.\n\n * CVE-2022-32250: net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.\n\n * CVE-2022-32296: The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.\n\n * CVE-2022-3239: A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.\n\n * CVE-2022-32981: An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.\n\n * CVE-2022-33743: network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.\n\n * CVE-2022-33744: Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.\n\n * CVE-2022-33981: drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.\n\n * CVE-2022-34494: rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.\n\n * CVE-2022-34495: rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.\n\n * CVE-2022-3526: A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.\n\n * CVE-2022-3545: A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.\n\n * CVE-2022-3577: An out-of-bounds memory write flaw was found in the Linux kernel’s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.\n\n * CVE-2022-40476: A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2022-41858: A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.\n\n * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2023-0459: Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47\n\n * CVE-2023-0461: There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c\n\n * CVE-2023-1249: A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.\n\n * CVE-2023-1872: A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx-\u003euring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n\n\n * CVE-2023-22995: In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.\n\n * CVE-2023-22996: In the Linux kernel before 5.17.2, drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use, e.g., with put_device.\n\n * CVE-2023-22999: In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23000: In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.\n\n * CVE-2023-23001: In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23002: In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23003: In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.\n\n * CVE-2023-3159: A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2022-06-30"
|
||
},
|
||
"Updated": {
|
||
"Date": "2022-06-30"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-00622",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00622",
|
||
"Impact": "High",
|
||
"Public": "20211218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00790",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-119, CWE-755, CWE-908, CWE-909",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00790",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00822",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-119, CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00822",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00823",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00823",
|
||
"Impact": "High",
|
||
"Public": "20220103"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00833",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00833",
|
||
"Impact": "Low",
|
||
"Public": "20220125"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00888",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00888",
|
||
"Impact": "High",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00889",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00889",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00891",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-668, CWE-1284",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00891",
|
||
"Impact": "Low",
|
||
"Public": "20220221"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00899",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-913",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00899",
|
||
"Impact": "High",
|
||
"Public": "20210519"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01249",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01249",
|
||
"Impact": "Low",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01499",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01499",
|
||
"Impact": "High",
|
||
"Public": "20220112"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01567",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01567",
|
||
"Impact": "High",
|
||
"Public": "20220307"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01597",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01597",
|
||
"Impact": "High",
|
||
"Public": "20220311"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01629",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:P/I:P/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||
"CWE": "CWE-129, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01629",
|
||
"Impact": "Low",
|
||
"Public": "20220317"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01630",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416, CWE-824",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01630",
|
||
"Impact": "Low",
|
||
"Public": "20220317"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01644",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01644",
|
||
"Impact": "High",
|
||
"Public": "20220201"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02112",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-371, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02112",
|
||
"Impact": "High",
|
||
"Public": "20220407"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02325",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02325",
|
||
"Impact": "Low",
|
||
"Public": "20211210"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02328",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02328",
|
||
"Impact": "High",
|
||
"Public": "20220226"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02361",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02361",
|
||
"Impact": "Low",
|
||
"Public": "20220105"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02362",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02362",
|
||
"Impact": "High",
|
||
"Public": "20211218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02387",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02387",
|
||
"Impact": "Low",
|
||
"Public": "20220124"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02443",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02443",
|
||
"Impact": "Low",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02672",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02672",
|
||
"Impact": "High",
|
||
"Public": "20220331"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02677",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401, CWE-772",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02677",
|
||
"Impact": "Low",
|
||
"Public": "20211020"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02681",
|
||
"CVSS": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02681",
|
||
"Impact": "Low",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02703",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02703",
|
||
"Impact": "High",
|
||
"Public": "20220224"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02816",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02816",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02817",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-665, CWE-909",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02817",
|
||
"Impact": "Low",
|
||
"Public": "20220428"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02885",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02885",
|
||
"Impact": "Low",
|
||
"Public": "20220221"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02886",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-367, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02886",
|
||
"Impact": "High",
|
||
"Public": "20220408"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02999",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02999",
|
||
"Impact": "Low",
|
||
"Public": "20211229"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03004",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-275, CWE-862, CWE-863",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03004",
|
||
"Impact": "High",
|
||
"Public": "20220512"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03034",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03034",
|
||
"Impact": "High",
|
||
"Public": "20220402"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03059",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-911",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03059",
|
||
"Impact": "High",
|
||
"Public": "20220415"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03283",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03283",
|
||
"Impact": "High",
|
||
"Public": "20220526"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03400",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03400",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03404",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03404",
|
||
"Impact": "Low",
|
||
"Public": "20220107"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03409",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03409",
|
||
"Impact": "Low",
|
||
"Public": "20220402"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03903",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03903",
|
||
"Impact": "High",
|
||
"Public": "20220331"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03904",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03904",
|
||
"Impact": "Low",
|
||
"Public": "20220318"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03921",
|
||
"CVSS": "AV:N/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203, CWE-330, CWE-331",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03921",
|
||
"Impact": "Low",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03970",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03970",
|
||
"Impact": "Low",
|
||
"Public": "20220626"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03984",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03984",
|
||
"Impact": "Low",
|
||
"Public": "20220626"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04052",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04052",
|
||
"Impact": "Low",
|
||
"Public": "20220426"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04244",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04244",
|
||
"Impact": "High",
|
||
"Public": "20220602"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04266",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04266",
|
||
"Impact": "High",
|
||
"Public": "20211117"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04271",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04271",
|
||
"Impact": "High",
|
||
"Public": "20220701"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04393",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-125, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04393",
|
||
"Impact": "Low",
|
||
"Public": "20220713"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04995",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-191, CWE-192, CWE-681, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04995",
|
||
"Impact": "High",
|
||
"Public": "20220415"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05010",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-755",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05010",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05184",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05184",
|
||
"Impact": "Low",
|
||
"Public": "20220406"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05402",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05402",
|
||
"Impact": "High",
|
||
"Public": "20220501"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05411",
|
||
"CVSS": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05411",
|
||
"Impact": "Low",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05417",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05417",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05481",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05481",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05692",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05692",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05717",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05717",
|
||
"Impact": "High",
|
||
"Public": "20220322"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05723",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05723",
|
||
"Impact": "High",
|
||
"Public": "20220307"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05777",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05777",
|
||
"Impact": "High",
|
||
"Public": "20210820"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05794",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05794",
|
||
"Impact": "High",
|
||
"Public": "20220916"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05844",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05844",
|
||
"Impact": "High",
|
||
"Public": "20220322"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05852",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05852",
|
||
"Impact": "High",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05855",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05855",
|
||
"Impact": "High",
|
||
"Public": "20220222"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05890",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05890",
|
||
"Impact": "High",
|
||
"Public": "20220125"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05997",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05997",
|
||
"Impact": "Low",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06397",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06397",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06398",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06398",
|
||
"Impact": "High",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06399",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06399",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06400",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06400",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06912",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06912",
|
||
"Impact": "Low",
|
||
"Public": "20220705"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07326",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07326",
|
||
"Impact": "Low",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07327",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07327",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07328",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07328",
|
||
"Impact": "Low",
|
||
"Public": "20220314"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07329",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07329",
|
||
"Impact": "Low",
|
||
"Public": "20220105"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07330",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07330",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07331",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07331",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07332",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07332",
|
||
"Impact": "Low",
|
||
"Public": "20220120"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07333",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07333",
|
||
"Impact": "Low",
|
||
"Public": "20211231"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07334",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07334",
|
||
"Impact": "Low",
|
||
"Public": "20220412"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07335",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07335",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07336",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-474",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07336",
|
||
"Impact": "High",
|
||
"Public": "20221116"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07337",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07337",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07352",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07352",
|
||
"Impact": "High",
|
||
"Public": "20220510"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07353",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07353",
|
||
"Impact": "High",
|
||
"Public": "20220527"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00359",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00359",
|
||
"Impact": "High",
|
||
"Public": "20220811"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00629",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00629",
|
||
"Impact": "High",
|
||
"Public": "20220406"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01191",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01191",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01198",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-459",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01198",
|
||
"Impact": "Low",
|
||
"Public": "20220421"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01200",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01200",
|
||
"Impact": "High",
|
||
"Public": "20230104"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01208",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-772, CWE-911",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01208",
|
||
"Impact": "Low",
|
||
"Public": "20220131"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01210",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01210",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01211",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01211",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01212",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01212",
|
||
"Impact": "Low",
|
||
"Public": "20220110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01217",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01217",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01275",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01275",
|
||
"Impact": "Low",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01298",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01298",
|
||
"Impact": "High",
|
||
"Public": "20230303"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01492",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-252, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01492",
|
||
"Impact": "High",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02164",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02164",
|
||
"Impact": "High",
|
||
"Public": "20220407"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02532",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-203, CWE-264, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02532",
|
||
"Impact": "Low",
|
||
"Public": "20230221"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03171",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03171",
|
||
"Impact": "High",
|
||
"Public": "20220425"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2020-35501",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
|
||
"Impact": "Low",
|
||
"Public": "20220330"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3743",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
|
||
"Impact": "High",
|
||
"Public": "20220304"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3847",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
|
||
"Impact": "High",
|
||
"Public": "20220401"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4002",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4090",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
|
||
"Impact": "High",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4095",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4135",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
|
||
"Impact": "Low",
|
||
"Public": "20220714"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4155",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-131",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
|
||
"Impact": "Low",
|
||
"Public": "20220824"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4202",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-44879",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
|
||
"Impact": "Low",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45402",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0168",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168",
|
||
"Impact": "Low",
|
||
"Public": "20220826"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0171",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-212",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0171",
|
||
"Impact": "Low",
|
||
"Public": "20220826"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0264",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
|
||
"Impact": "Low",
|
||
"Public": "20220204"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0330",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0382",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0433",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0494",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0500",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0500",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0516",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
|
||
"Impact": "High",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0617",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0854",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
|
||
"Impact": "Low",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0995",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0995",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1011",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
|
||
"Impact": "High",
|
||
"Public": "20220318"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1012",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
|
||
"Impact": "High",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1015",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015",
|
||
"Impact": "Low",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1016",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1048",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
|
||
"Impact": "High",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1055",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
|
||
"Impact": "High",
|
||
"Public": "20220329"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1158",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158",
|
||
"Impact": "High",
|
||
"Public": "20220805"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1195",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
|
||
"Impact": "Low",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1198",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1199",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1199",
|
||
"Impact": "High",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1204",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1205",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1263",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1353",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
|
||
"Impact": "High",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1651",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1651",
|
||
"Impact": "High",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1652",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1652",
|
||
"Impact": "High",
|
||
"Public": "20220602"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1671",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1671",
|
||
"Impact": "High",
|
||
"Public": "20220726"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1734",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1734",
|
||
"Impact": "High",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1943",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1943",
|
||
"Impact": "High",
|
||
"Public": "20220602"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2153",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-23222",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-23222",
|
||
"Impact": "High",
|
||
"Public": "20220114"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2380",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2380",
|
||
"Impact": "Low",
|
||
"Public": "20220713"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24448",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
|
||
"Impact": "Low",
|
||
"Public": "20220204"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24958",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-763",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958",
|
||
"Impact": "High",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24959",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25258",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25265",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-913",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
|
||
"Impact": "High",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25375",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-1284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375",
|
||
"Impact": "Low",
|
||
"Public": "20220220"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2639",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-681",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639",
|
||
"Impact": "High",
|
||
"Public": "20220901"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26490",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490",
|
||
"Impact": "High",
|
||
"Public": "20220306"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26878",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
|
||
"Impact": "Low",
|
||
"Public": "20220311"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26966",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966",
|
||
"Impact": "Low",
|
||
"Public": "20220312"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27223",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223",
|
||
"Impact": "High",
|
||
"Public": "20220316"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27666",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
|
||
"Impact": "High",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27950",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
|
||
"Impact": "Low",
|
||
"Public": "20220328"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28356",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356",
|
||
"Impact": "Low",
|
||
"Public": "20220402"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28388",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388",
|
||
"Impact": "Low",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28389",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28389",
|
||
"Impact": "Low",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28390",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390",
|
||
"Impact": "High",
|
||
"Public": "20220403"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28796",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796",
|
||
"Impact": "High",
|
||
"Public": "20220408"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28893",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28893",
|
||
"Impact": "High",
|
||
"Public": "20220411"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29581",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29581",
|
||
"Impact": "High",
|
||
"Public": "20220517"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29582",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29582",
|
||
"Impact": "High",
|
||
"Public": "20220422"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2959",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959",
|
||
"Impact": "High",
|
||
"Public": "20220825"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2977",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2977",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-29968",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968",
|
||
"Impact": "High",
|
||
"Public": "20220502"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-30594",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594",
|
||
"Impact": "High",
|
||
"Public": "20220512"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3078",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3078",
|
||
"Impact": "Low",
|
||
"Public": "20220901"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3104",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3105",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3106",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3107",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3108",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3110",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3111",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3112",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3113",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3114",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3115",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3176",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3176",
|
||
"Impact": "High",
|
||
"Public": "20220916"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3202",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3202",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-32250",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
|
||
"Impact": "High",
|
||
"Public": "20220602"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-32296",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-330",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296",
|
||
"Impact": "Low",
|
||
"Public": "20220605"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3239",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239",
|
||
"Impact": "High",
|
||
"Public": "20220919"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-32981",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32981",
|
||
"Impact": "High",
|
||
"Public": "20220610"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-33743",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743",
|
||
"Impact": "High",
|
||
"Public": "20220705"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-33744",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33744",
|
||
"Impact": "Low",
|
||
"Public": "20220705"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-33981",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33981",
|
||
"Impact": "Low",
|
||
"Public": "20220618"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34494",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34494",
|
||
"Impact": "Low",
|
||
"Public": "20220626"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-34495",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34495",
|
||
"Impact": "Low",
|
||
"Public": "20220626"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3526",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3526",
|
||
"Impact": "High",
|
||
"Public": "20221016"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3545",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545",
|
||
"Impact": "High",
|
||
"Public": "20221017"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3577",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3577",
|
||
"Impact": "High",
|
||
"Public": "20221020"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40476",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476",
|
||
"Impact": "Low",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41858",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858",
|
||
"Impact": "High",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4378",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
|
||
"Impact": "High",
|
||
"Public": "20230105"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0459",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-763",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
|
||
"Impact": "Low",
|
||
"Public": "20230525"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0461",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
|
||
"Impact": "High",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1249",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1249",
|
||
"Impact": "Low",
|
||
"Public": "20230323"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1872",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872",
|
||
"Impact": "High",
|
||
"Public": "20230412"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22995",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995",
|
||
"Impact": "High",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22996",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-772",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22996",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22999",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23000",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23001",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23002",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23003",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3159",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3159",
|
||
"Impact": "Low",
|
||
"Public": "20230612"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:10",
|
||
"cpe:/o:alt:workstation:10",
|
||
"cpe:/o:alt:server:10",
|
||
"cpe:/o:alt:server-v:10",
|
||
"cpe:/o:alt:education:10",
|
||
"cpe:/o:alt:slinux:10",
|
||
"cpe:/o:alt:starterkit:p10",
|
||
"cpe:/o:alt:kworkstation:10.1",
|
||
"cpe:/o:alt:workstation:10.1",
|
||
"cpe:/o:alt:server:10.1",
|
||
"cpe:/o:alt:server-v:10.1",
|
||
"cpe:/o:alt:education:10.1",
|
||
"cpe:/o:alt:slinux:10.1",
|
||
"cpe:/o:alt:starterkit:10.1",
|
||
"cpe:/o:alt:kworkstation:10.2",
|
||
"cpe:/o:alt:workstation:10.2",
|
||
"cpe:/o:alt:server:10.2",
|
||
"cpe:/o:alt:server-v:10.2",
|
||
"cpe:/o:alt:education:10.2",
|
||
"cpe:/o:alt:slinux:10.2",
|
||
"cpe:/o:alt:starterkit:10.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20222155001",
|
||
"Comment": "kernel-headers-modules-rpi-un is earlier than 1:5.18.7-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20222155002",
|
||
"Comment": "kernel-headers-rpi-un is earlier than 1:5.18.7-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20222155003",
|
||
"Comment": "kernel-image-rpi-un is earlier than 1:5.18.7-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |