2024-12-12 21:07:30 +00:00

1265 lines
72 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20234663",
"Version": "oval:org.altlinux.errata:def:20234663",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-4663: package `kernel-image-pine` update to version 6.4.7-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-4663",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-4663",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-01206",
"RefURL": "https://bdu.fstec.ru/vul/2023-01206",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01800",
"RefURL": "https://bdu.fstec.ru/vul/2023-01800",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01962",
"RefURL": "https://bdu.fstec.ru/vul/2023-01962",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02115",
"RefURL": "https://bdu.fstec.ru/vul/2023-02115",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02118",
"RefURL": "https://bdu.fstec.ru/vul/2023-02118",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02163",
"RefURL": "https://bdu.fstec.ru/vul/2023-02163",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02229",
"RefURL": "https://bdu.fstec.ru/vul/2023-02229",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02407",
"RefURL": "https://bdu.fstec.ru/vul/2023-02407",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02524",
"RefURL": "https://bdu.fstec.ru/vul/2023-02524",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02526",
"RefURL": "https://bdu.fstec.ru/vul/2023-02526",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02529",
"RefURL": "https://bdu.fstec.ru/vul/2023-02529",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02625",
"RefURL": "https://bdu.fstec.ru/vul/2023-02625",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02740",
"RefURL": "https://bdu.fstec.ru/vul/2023-02740",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02749",
"RefURL": "https://bdu.fstec.ru/vul/2023-02749",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02997",
"RefURL": "https://bdu.fstec.ru/vul/2023-02997",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03110",
"RefURL": "https://bdu.fstec.ru/vul/2023-03110",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03169",
"RefURL": "https://bdu.fstec.ru/vul/2023-03169",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03172",
"RefURL": "https://bdu.fstec.ru/vul/2023-03172",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03435",
"RefURL": "https://bdu.fstec.ru/vul/2023-03435",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03444",
"RefURL": "https://bdu.fstec.ru/vul/2023-03444",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03494",
"RefURL": "https://bdu.fstec.ru/vul/2023-03494",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03495",
"RefURL": "https://bdu.fstec.ru/vul/2023-03495",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03496",
"RefURL": "https://bdu.fstec.ru/vul/2023-03496",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03497",
"RefURL": "https://bdu.fstec.ru/vul/2023-03497",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03498",
"RefURL": "https://bdu.fstec.ru/vul/2023-03498",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03499",
"RefURL": "https://bdu.fstec.ru/vul/2023-03499",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03500",
"RefURL": "https://bdu.fstec.ru/vul/2023-03500",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03501",
"RefURL": "https://bdu.fstec.ru/vul/2023-03501",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03502",
"RefURL": "https://bdu.fstec.ru/vul/2023-03502",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03656",
"RefURL": "https://bdu.fstec.ru/vul/2023-03656",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03677",
"RefURL": "https://bdu.fstec.ru/vul/2023-03677",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03721",
"RefURL": "https://bdu.fstec.ru/vul/2023-03721",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03727",
"RefURL": "https://bdu.fstec.ru/vul/2023-03727",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03783",
"RefURL": "https://bdu.fstec.ru/vul/2023-03783",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03786",
"RefURL": "https://bdu.fstec.ru/vul/2023-03786",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03951",
"RefURL": "https://bdu.fstec.ru/vul/2023-03951",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03952",
"RefURL": "https://bdu.fstec.ru/vul/2023-03952",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03953",
"RefURL": "https://bdu.fstec.ru/vul/2023-03953",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03954",
"RefURL": "https://bdu.fstec.ru/vul/2023-03954",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03955",
"RefURL": "https://bdu.fstec.ru/vul/2023-03955",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03956",
"RefURL": "https://bdu.fstec.ru/vul/2023-03956",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03957",
"RefURL": "https://bdu.fstec.ru/vul/2023-03957",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03960",
"RefURL": "https://bdu.fstec.ru/vul/2023-03960",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03961",
"RefURL": "https://bdu.fstec.ru/vul/2023-03961",
"Source": "BDU"
},
{
"RefID": "CVE-2023-0160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0160",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1079",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1079",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1855",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1855",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1989",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1990",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1990",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1998",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2002",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2124",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2124",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2176",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2176",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2194",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2194",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2235",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2235",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2985",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2985",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3090",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3090",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3117",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3117",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3141",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3141",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3212",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3212",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3220",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3220",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32233",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32250",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32250",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32254",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32254",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3268",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3268",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3312",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3312",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3317",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3317",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3389",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3389",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3390",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3390",
"Source": "CVE"
},
{
"RefID": "CVE-2023-34256",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34256",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35788",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35788",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35823",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35823",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35824",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35824",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35826",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35826",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35827",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35827",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35828",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35828",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35829",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35829",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3609",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3610",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3610",
"Source": "CVE"
},
{
"RefID": "CVE-2023-37453",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37453",
"Source": "CVE"
},
{
"RefID": "CVE-2023-37454",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37454",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38426",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38426",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38427",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38427",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38428",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38428",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38429",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38429",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38430",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38430",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38431",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38431",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38432",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38432",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-pine to version 6.4.7-alt1. \nSecurity Fix(es):\n\n * BDU:2023-01206: Уязвимость функции asus_kbd_backlight_set() (drivers/hid/hid-asus.c) драйвера ASUS USB клавиатуры ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01800: Уязвимость функции sock_hash_delete_elem() в модуле net/core/sock_map.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01962: Уязвимость функции xgene_hwmon_remove (drivers/hwmon/xgene-hwmon.c) драйвера мониторинга оборудования xgene-hwmon ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании и раскрыть защищаемую информацию\n\n * BDU:2023-02115: Уязвимость функции prctl ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2023-02118: Уязвимость подсистемы проверки разрешений Bluetooth ядра операционной системы Linux, позволяющая нарушителю выполнять произвольные команды\n\n * BDU:2023-02163: Уязвимость функции btsdio_remove() модуля drivers\\bluetooth\\btsdio.c драйвера Bluetooth ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02229: Уязвимость функции ndlc_remove() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02407: Уязвимость функции perf_group_detach() утилиты perf ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02524: Уязвимость функции slimpro_i2c_blkwr() в модуле drivers/i2c/busses/i2c-xgene-slimpro.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2023-02526: Уязвимость драйвера Infiniband ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-02529: Уязвимость файловой системы XFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-02625: Уязвимость функции nf_tables_commit() в модуле net/netfilter/nf_tables_api.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных или повысить свои привилегии в системе и выполнить произвольный код\n\n * BDU:2023-02740: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-02749: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность защищаемой информации и выполнить произвольный код\n\n * BDU:2023-02997: Уязвимость драйвере файловой системы ext4 ядра операционной системы Linux в функции ext4_group_desc_csum(), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03110: Уязвимость функции hfsplus_put_super() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-03169: Уязвимость функции gfs2_evict_inode() в модуле fs/gfs2/super.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-03172: Уязвимость функции r592_remove() в модуле drivers/memstick/host/r592.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации\n\n * BDU:2023-03435: Уязвимость функции ravb_remove() в модуле drivers/net/ethernet/renesas/ravb_main.c драйвера сетевых устройств Renesas ядра операционной системы Linux в функции ravb_remove(), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03444: Уязвимость функции rkvdec_remove() в модуле drivers/staging/media/rkvdec/rkvdec.c драйвера Rockchip Video Decoder ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03494: Уязвимость функции dpu_crtc_atomic_check() в модуле drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c драйвера MSM DRM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-03495: Уязвимость реализации файловой системы relayfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или раскрыть защищаемую информацию\n\n * BDU:2023-03496: Уязвимость функции qcom_cpufreq_hw_cpu_exit() в модуле drivers/cpufreq/qcom-cpufreq-hw.c подсистемы cpufreq (CPU Frequency scaling) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-03497: Уязвимость функции mt7921_check_offload_capability() в модуле drivers/net/wireless/mediatek/mt76/mt7921/init.c драйвера беспроводного устройства mt7921 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации\n\n * BDU:2023-03498: Уязвимость функции fl_set_geneve_opt() в модуле net/sched/cls_flower.c подсистемы управления трафиком net/sched ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-03499: Уязвимость функции saa7134_finidev() в модуле drivers/media/pci/saa7134/saa7134-core.c драйвера Philips SAA7134 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03500: Уязвимость функции dm1105_remove() в модуле drivers/media/pci/dm1105/dm1105.c драйвера TV Tuner на микросхеме DM1105 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03501: Уязвимость функции renesas_usb3_remove() в модуле drivers/usb/gadget/udc/renesas_usb3.c драйвера USB устройств Renesas ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03502: Уязвимость cedrus_remove() в модуле drivers/staging/media/sunxi/cedrus/cedrus.c драйвера Allwinner sunXi ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03656: Уязвимость функции nft_set_lookup_global() подсистемы Netfilter ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии и вызвать отказ в обслуживании\n\n * BDU:2023-03677: Уязвимость подсистемы Netfilter ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03721: Уязвимость драйвера IPVLAN ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-03727: Уязвимость функции io_poll_update() в модуле io_uring/io_uring.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-03783: Уязвимость функции read_descriptors() в модуле drivers/usb/core/sysfs.c драйвера USB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-03786: Уязвимость функции udf_close_lvid() в модуле fs/udf/super.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на доступность защищаемой информации\n\n * BDU:2023-03951: Уязвимость функции ksmbd_smb2_check_message() в модуле fs/smb/server/smb2misc.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03952: Уязвимость функции ksmbd_conn_handler_loop() в модуле fs/smb/server/connection.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03953: Уязвимость функции ksmbd_verify_smb_message() в модуле fs/smb/server/smb_common.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03954: Уязвимость функции ksmbd_conn_handler_loop() в модуле fs/ksmbd/connection.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03955: Уязвимость функции session_user() в модуле fs/ksmbd/smb2pdu.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03956: Уязвимость функции deassemble_neg_contexts() в модуле fs/smb/server/smb2pdu.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03957: Уязвимость функции smb2_find_context_vals() в модуле fs/ksmbd/oplock.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03960: Уязвимость функции u32_set_parms() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-03961: Уязвимость функции nft_immediate_destroy() в модуле net/netfilter/nft_immediate.c подсистемы Netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных.\n\n * CVE-2023-0160: A deadlock flaw was found in the Linux kernels BPF subsystem. This flaw allows a local user to potentially crash the system.\n\n * CVE-2023-1079: A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.\n\n * CVE-2023-1855: A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.\n\n * CVE-2023-1989: A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.\n\n * CVE-2023-1990: A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.\n\n * CVE-2023-1998: The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n\n\n * CVE-2023-2002: A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.\n\n * CVE-2023-2124: An out-of-bounds memory access flaw was found in the Linux kernels XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2023-2176: A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.\n\n * CVE-2023-2194: An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.\n\n * CVE-2023-2235: A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.\n\nThe perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.\n\n\n\n * CVE-2023-2985: A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.\n\n * CVE-2023-3090: A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb-\u003ecb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.\n\n\n\n * CVE-2023-3117: Rejected reason: Duplicate of CVE-2023-3390.\n\n * CVE-2023-3141: A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.\n\n * CVE-2023-3212: A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.\n\n * CVE-2023-3220: An issue was discovered in the Linux kernel through 6.1-rc8. dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference.\n\n * CVE-2023-32233: In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.\n\n * CVE-2023-32250: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.\n\n * CVE-2023-32254: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.\n\n * CVE-2023-3268: An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.\n\n * CVE-2023-3312: A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service.\n\n * CVE-2023-3317: A use-after-free flaw was found in mt7921_check_offload_capability in drivers/net/wireless/mediatek/mt76/mt7921/init.c in wifi mt76/mt7921 sub-component in the Linux Kernel. This flaw could allow an attacker to crash the system after 'features' memory release. This vulnerability could even lead to a kernel information leak problem.\n\n * CVE-2023-3389: A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nRacing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\n\nWe recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).\n\n\n\n * CVE-2023-3390: A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.\n\n * CVE-2023-34256: An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated \"When modifying the block device while it is mounted by the filesystem\" access.\n\n * CVE-2023-35788: An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.\n\n * CVE-2023-35823: An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.\n\n * CVE-2023-35824: An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.\n\n * CVE-2023-35826: An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in cedrus_remove in drivers/staging/media/sunxi/cedrus/cedrus.c.\n\n * CVE-2023-35827: An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.\n\n * CVE-2023-35828: An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.\n\n * CVE-2023-35829: An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.\n\n * CVE-2023-3609: A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n\n\n * CVE-2023-3610: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.\n\nWe recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.\n\n\n\n * CVE-2023-37453: An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.\n\n * CVE-2023-37454: An issue was discovered in the Linux kernel through 6.4.2. A crafted UDF filesystem image causes a use-after-free write operation in the udf_put_super and udf_close_lvid functions in fs/udf/super.c. NOTE: the suse.com reference has a different perspective about this.\n\n * CVE-2023-38426: An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.\n\n * CVE-2023-38427: An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.\n\n * CVE-2023-38428: An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.\n\n * CVE-2023-38429: An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access.\n\n * CVE-2023-38430: An issue was discovered in the Linux kernel before 6.3.9. ksmbd does not validate the SMB request protocol ID, leading to an out-of-bounds read.\n\n * CVE-2023-38431: An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.\n\n * CVE-2023-38432: An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-08-01"
},
"Updated": {
"Date": "2023-08-01"
},
"BDUs": [
{
"ID": "BDU:2023-01206",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01206",
"Impact": "Low",
"Public": "20230215"
},
{
"ID": "BDU:2023-01800",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667, CWE-833",
"Href": "https://bdu.fstec.ru/vul/2023-01800",
"Impact": "Low",
"Public": "20230330"
},
{
"ID": "BDU:2023-01962",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01962",
"Impact": "Low",
"Public": "20230310"
},
{
"ID": "BDU:2023-02115",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-203, CWE-399, CWE-699, CWE-1303",
"Href": "https://bdu.fstec.ru/vul/2023-02115",
"Impact": "Low",
"Public": "20230227"
},
{
"ID": "BDU:2023-02118",
"CVSS": "AV:A/AC:L/Au:S/C:P/I:P/A:C",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-20, CWE-250, CWE-863",
"Href": "https://bdu.fstec.ru/vul/2023-02118",
"Impact": "Low",
"Public": "20230417"
},
{
"ID": "BDU:2023-02163",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02163",
"Impact": "High",
"Public": "20230323"
},
{
"ID": "BDU:2023-02229",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02229",
"Impact": "Low",
"Public": "20230315"
},
{
"ID": "BDU:2023-02407",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-02407",
"Impact": "High",
"Public": "20230315"
},
{
"ID": "BDU:2023-02524",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-02524",
"Impact": "Low",
"Public": "20230316"
},
{
"ID": "BDU:2023-02526",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-02526",
"Impact": "High",
"Public": "20230110"
},
{
"ID": "BDU:2023-02529",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-02529",
"Impact": "High",
"Public": "20230412"
},
{
"ID": "BDU:2023-02625",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02625",
"Impact": "High",
"Public": "20230503"
},
{
"ID": "BDU:2023-02740",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2023-02740",
"Impact": "Critical",
"Public": "20230501"
},
{
"ID": "BDU:2023-02749",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2023-02749",
"Impact": "High",
"Public": "20230427"
},
{
"ID": "BDU:2023-02997",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-02997",
"Impact": "Low",
"Public": "20230513"
},
{
"ID": "BDU:2023-03110",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03110",
"Impact": "Low",
"Public": "20220917"
},
{
"ID": "BDU:2023-03169",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-03169",
"Impact": "Low",
"Public": "20230510"
},
{
"ID": "BDU:2023-03172",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03172",
"Impact": "High",
"Public": "20230323"
},
{
"ID": "BDU:2023-03435",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03435",
"Impact": "High",
"Public": "20230620"
},
{
"ID": "BDU:2023-03444",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03444",
"Impact": "High",
"Public": "20230410"
},
{
"ID": "BDU:2023-03494",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-03494",
"Impact": "Low",
"Public": "20230124"
},
{
"ID": "BDU:2023-03495",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-03495",
"Impact": "High",
"Public": "20230502"
},
{
"ID": "BDU:2023-03496",
"CVSS": "AV:L/AC:L/Au:M/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2023-03496",
"Impact": "Low",
"Public": "20230330"
},
{
"ID": "BDU:2023-03497",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03497",
"Impact": "High",
"Public": "20230331"
},
{
"ID": "BDU:2023-03498",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-03498",
"Impact": "High",
"Public": "20230601"
},
{
"ID": "BDU:2023-03499",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03499",
"Impact": "Low",
"Public": "20230411"
},
{
"ID": "BDU:2023-03500",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03500",
"Impact": "High",
"Public": "20230411"
},
{
"ID": "BDU:2023-03501",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03501",
"Impact": "High",
"Public": "20230323"
},
{
"ID": "BDU:2023-03502",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03502",
"Impact": "High",
"Public": "20230410"
},
{
"ID": "BDU:2023-03656",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03656",
"Impact": "High",
"Public": "20230607"
},
{
"ID": "BDU:2023-03677",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03677",
"Impact": "High",
"Public": "20230608"
},
{
"ID": "BDU:2023-03721",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-03721",
"Impact": "High",
"Public": "20230510"
},
{
"ID": "BDU:2023-03727",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416, CWE-662",
"Href": "https://bdu.fstec.ru/vul/2023-03727",
"Impact": "High",
"Public": "20220724"
},
{
"ID": "BDU:2023-03783",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-03783",
"Impact": "Low",
"Public": "20230705"
},
{
"ID": "BDU:2023-03786",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03786",
"Impact": "Low",
"Public": "20230707"
},
{
"ID": "BDU:2023-03951",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-03951",
"Impact": "Critical",
"Public": "20230616"
},
{
"ID": "BDU:2023-03952",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-03952",
"Impact": "Critical",
"Public": "20230602"
},
{
"ID": "BDU:2023-03953",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-03953",
"Impact": "Critical",
"Public": "20230602"
},
{
"ID": "BDU:2023-03954",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125, CWE-193, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-03954",
"Impact": "Critical",
"Public": "20230516"
},
{
"ID": "BDU:2023-03955",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-03955",
"Impact": "Critical",
"Public": "20230516"
},
{
"ID": "BDU:2023-03956",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125, CWE-191",
"Href": "https://bdu.fstec.ru/vul/2023-03956",
"Impact": "Critical",
"Public": "20230602"
},
{
"ID": "BDU:2023-03957",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-03957",
"Impact": "Low",
"Public": "20230516"
},
{
"ID": "BDU:2023-03960",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03960",
"Impact": "High",
"Public": "20230609"
},
{
"ID": "BDU:2023-03961",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-03961",
"Impact": "High",
"Public": "20230620"
}
],
"CVEs": [
{
"ID": "CVE-2023-0160",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0160",
"Impact": "Low",
"Public": "20230718"
},
{
"ID": "CVE-2023-1079",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1079",
"Impact": "Low",
"Public": "20230327"
},
{
"ID": "CVE-2023-1855",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1855",
"Impact": "Low",
"Public": "20230405"
},
{
"ID": "CVE-2023-1989",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989",
"Impact": "High",
"Public": "20230411"
},
{
"ID": "CVE-2023-1990",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1990",
"Impact": "Low",
"Public": "20230412"
},
{
"ID": "CVE-2023-1998",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1998",
"Impact": "Low",
"Public": "20230421"
},
{
"ID": "CVE-2023-2002",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2002",
"Impact": "Low",
"Public": "20230526"
},
{
"ID": "CVE-2023-2124",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2124",
"Impact": "High",
"Public": "20230515"
},
{
"ID": "CVE-2023-2176",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2176",
"Impact": "High",
"Public": "20230420"
},
{
"ID": "CVE-2023-2194",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2194",
"Impact": "Low",
"Public": "20230420"
},
{
"ID": "CVE-2023-2235",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2235",
"Impact": "High",
"Public": "20230501"
},
{
"ID": "CVE-2023-2985",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2985",
"Impact": "Low",
"Public": "20230601"
},
{
"ID": "CVE-2023-3090",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3090",
"Impact": "High",
"Public": "20230628"
},
{
"ID": "CVE-2023-3117",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3117",
"Impact": "None",
"Public": "20230630"
},
{
"ID": "CVE-2023-3141",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3141",
"Impact": "High",
"Public": "20230609"
},
{
"ID": "CVE-2023-3212",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3212",
"Impact": "Low",
"Public": "20230623"
},
{
"ID": "CVE-2023-3220",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3220",
"Impact": "Low",
"Public": "20230620"
},
{
"ID": "CVE-2023-32233",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233",
"Impact": "High",
"Public": "20230508"
},
{
"ID": "CVE-2023-32250",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32250",
"Impact": "High",
"Public": "20230710"
},
{
"ID": "CVE-2023-32254",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32254",
"Impact": "High",
"Public": "20230710"
},
{
"ID": "CVE-2023-3268",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3268",
"Impact": "High",
"Public": "20230616"
},
{
"ID": "CVE-2023-3312",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3312",
"Impact": "High",
"Public": "20230619"
},
{
"ID": "CVE-2023-3317",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3317",
"Impact": "High",
"Public": "20230623"
},
{
"ID": "CVE-2023-3389",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3389",
"Impact": "High",
"Public": "20230628"
},
{
"ID": "CVE-2023-3390",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3390",
"Impact": "High",
"Public": "20230628"
},
{
"ID": "CVE-2023-34256",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34256",
"Impact": "Low",
"Public": "20230531"
},
{
"ID": "CVE-2023-35788",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35788",
"Impact": "High",
"Public": "20230616"
},
{
"ID": "CVE-2023-35823",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35823",
"Impact": "High",
"Public": "20230618"
},
{
"ID": "CVE-2023-35824",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35824",
"Impact": "High",
"Public": "20230618"
},
{
"ID": "CVE-2023-35826",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35826",
"Impact": "High",
"Public": "20230618"
},
{
"ID": "CVE-2023-35827",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35827",
"Impact": "High",
"Public": "20230618"
},
{
"ID": "CVE-2023-35828",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35828",
"Impact": "High",
"Public": "20230618"
},
{
"ID": "CVE-2023-35829",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35829",
"Impact": "High",
"Public": "20230618"
},
{
"ID": "CVE-2023-3609",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3609",
"Impact": "High",
"Public": "20230721"
},
{
"ID": "CVE-2023-3610",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3610",
"Impact": "High",
"Public": "20230721"
},
{
"ID": "CVE-2023-37453",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37453",
"Impact": "Low",
"Public": "20230706"
},
{
"ID": "CVE-2023-37454",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37454",
"Impact": "Low",
"Public": "20230706"
},
{
"ID": "CVE-2023-38426",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38426",
"Impact": "Critical",
"Public": "20230718"
},
{
"ID": "CVE-2023-38427",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38427",
"Impact": "Critical",
"Public": "20230718"
},
{
"ID": "CVE-2023-38428",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38428",
"Impact": "Critical",
"Public": "20230718"
},
{
"ID": "CVE-2023-38429",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-193",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38429",
"Impact": "Critical",
"Public": "20230718"
},
{
"ID": "CVE-2023-38430",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38430",
"Impact": "Critical",
"Public": "20230718"
},
{
"ID": "CVE-2023-38431",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38431",
"Impact": "Critical",
"Public": "20230718"
},
{
"ID": "CVE-2023-38432",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38432",
"Impact": "Critical",
"Public": "20230718"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20234663001",
"Comment": "kernel-headers-modules-pine is earlier than 1:6.4.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20234663002",
"Comment": "kernel-headers-pine is earlier than 1:6.4.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20234663003",
"Comment": "kernel-image-pine is earlier than 1:6.4.7-alt1"
}
]
}
]
}
}
]
}