2024-12-12 21:07:30 +00:00

119 lines
4.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221267",
"Version": "oval:org.altlinux.errata:def:20221267",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1267: package `kernel-image-centos` update to version 5.14.0.59-alt1.el9",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1267",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1267",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-01472",
"RefURL": "https://bdu.fstec.ru/vul/2022-01472",
"Source": "BDU"
},
{
"RefID": "CVE-2022-0185",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-centos to version 5.14.0.59-alt1.el9. \nSecurity Fix(es):\n\n * BDU:2022-01472: Уязвимость функции legacy_parse_param ядра операционной системы Linux, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2022-0185: A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-02-12"
},
"Updated": {
"Date": "2022-02-12"
},
"BDUs": [
{
"ID": "BDU:2022-01472",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-01472",
"Impact": "High",
"Public": "20220211"
}
],
"CVEs": [
{
"ID": "CVE-2022-0185",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-191",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
"Impact": "High",
"Public": "20220211"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221267001",
"Comment": "kernel-headers-centos is earlier than 0:5.14.0.59-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221267002",
"Comment": "kernel-headers-modules-centos is earlier than 0:5.14.0.59-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221267003",
"Comment": "kernel-image-centos is earlier than 0:5.14.0.59-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221267004",
"Comment": "kernel-modules-alsa-centos is earlier than 0:5.14.0.59-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221267005",
"Comment": "kernel-modules-drm-centos is earlier than 0:5.14.0.59-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221267006",
"Comment": "kernel-modules-media-centos is earlier than 0:5.14.0.59-alt1.el9"
}
]
}
]
}
}
]
}