2024-12-12 21:07:30 +00:00

373 lines
18 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222860",
"Version": "oval:org.altlinux.errata:def:20222860",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2860: package `kernel-image-mp` update to version 5.19.16-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2860",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2860",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-06228",
"RefURL": "https://bdu.fstec.ru/vul/2022-06228",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06272",
"RefURL": "https://bdu.fstec.ru/vul/2022-06272",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06273",
"RefURL": "https://bdu.fstec.ru/vul/2022-06273",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06274",
"RefURL": "https://bdu.fstec.ru/vul/2022-06274",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07349",
"RefURL": "https://bdu.fstec.ru/vul/2022-07349",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07350",
"RefURL": "https://bdu.fstec.ru/vul/2022-07350",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07351",
"RefURL": "https://bdu.fstec.ru/vul/2022-07351",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07356",
"RefURL": "https://bdu.fstec.ru/vul/2022-07356",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07357",
"RefURL": "https://bdu.fstec.ru/vul/2022-07357",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00631",
"RefURL": "https://bdu.fstec.ru/vul/2023-00631",
"Source": "BDU"
},
{
"RefID": "CVE-2022-2978",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2978",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3649",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3649",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3977",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3977",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41674",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41848",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41848",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41849",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41849",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41850",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41850",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42719",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42719",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42720",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42721",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42722",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
"Source": "CVE"
},
{
"RefID": "CVE-2022-43750",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.19.16-alt1. \nSecurity Fix(es):\n\n * BDU:2022-06228: Уязвимость функции roccat_report_event (drivers/hid/hid-roccat.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06272: Уязвимость функции cfg80211_update_notlisted_nontrans файла net/wireless/scan.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06273: Уязвимость функционала подсчета ссылок в режиме BSS (Basic Service Set) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06274: Уязвимость ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07349: Уязвимость драйвера drivers/usb/mon/mon_bin.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07350: Уязвимость функционала подсчета ссылок в режиме BSS (Basic Service Set) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07351: Уязвимость ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07356: Уязвимость драйвера drivers/char/pcmcia/synclink_cs.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07357: Уязвимость драйвера drivers/video/fbdev/smscufx.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00631: Уязвимость функции nilfs_new_inode компонента BPF ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2022-2978: A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.\n\n * CVE-2022-3649: A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.\n\n * CVE-2022-3977: A use-after-free flaw was found in the Linux kernel MCTP (Management Component Transport Protocol) functionality. This issue occurs when a user simultaneously calls DROPTAG ioctl and socket close happens, which could allow a local user to crash the system or potentially escalate their privileges on the system.\n\n * CVE-2022-41674: An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.\n\n * CVE-2022-41848: drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.\n\n * CVE-2022-41849: drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.\n\n * CVE-2022-41850: roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.\n\n * CVE-2022-42719: A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.\n\n * CVE-2022-42720: Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.\n\n * CVE-2022-42721: A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.\n\n * CVE-2022-42722: In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.\n\n * CVE-2022-43750: drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-10-17"
},
"Updated": {
"Date": "2022-10-17"
},
"BDUs": [
{
"ID": "BDU:2022-06228",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06228",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "BDU:2022-06272",
"CVSS": "AV:A/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-120, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-06272",
"Impact": "High",
"Public": "20221010"
},
{
"ID": "BDU:2022-06273",
"CVSS": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06273",
"Impact": "High",
"Public": "20221010"
},
{
"ID": "BDU:2022-06274",
"CVSS": "AV:A/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06274",
"Impact": "High",
"Public": "20221010"
},
{
"ID": "BDU:2022-07349",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-07349",
"Impact": "High",
"Public": "20221026"
},
{
"ID": "BDU:2022-07350",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2022-07350",
"Impact": "Low",
"Public": "20221013"
},
{
"ID": "BDU:2022-07351",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07351",
"Impact": "Low",
"Public": "20221013"
},
{
"ID": "BDU:2022-07356",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-07356",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "BDU:2022-07357",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-07357",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "BDU:2023-00631",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00631",
"Impact": "High",
"Public": "20221011"
}
],
"CVEs": [
{
"ID": "CVE-2022-2978",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2978",
"Impact": "High",
"Public": "20220824"
},
{
"ID": "CVE-2022-3649",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3649",
"Impact": "High",
"Public": "20221021"
},
{
"ID": "CVE-2022-3977",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3977",
"Impact": "High",
"Public": "20230112"
},
{
"ID": "CVE-2022-41674",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674",
"Impact": "High",
"Public": "20221014"
},
{
"ID": "CVE-2022-41848",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41848",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "CVE-2022-41849",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41849",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "CVE-2022-41850",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41850",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "CVE-2022-42719",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42719",
"Impact": "High",
"Public": "20221013"
},
{
"ID": "CVE-2022-42720",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720",
"Impact": "High",
"Public": "20221014"
},
{
"ID": "CVE-2022-42721",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721",
"Impact": "Low",
"Public": "20221014"
},
{
"ID": "CVE-2022-42722",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722",
"Impact": "Low",
"Public": "20221014"
},
{
"ID": "CVE-2022-43750",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750",
"Impact": "Low",
"Public": "20221026"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222860001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.19.16-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222860002",
"Comment": "kernel-headers-mp is earlier than 0:5.19.16-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222860003",
"Comment": "kernel-image-mp is earlier than 0:5.19.16-alt1"
}
]
}
]
}
}
]
}