vuln-list-alt/oval/p11/ALT-PU-2022-1365/definitions.json
2024-12-18 09:06:35 +00:00

159 lines
6.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221365",
"Version": "oval:org.altlinux.errata:def:20221365",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1365: package `kernel-image-centos` update to version 5.14.0.68-alt1.el9",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1365",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1365",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00680",
"RefURL": "https://bdu.fstec.ru/vul/2022-00680",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05890",
"RefURL": "https://bdu.fstec.ru/vul/2022-05890",
"Source": "BDU"
},
{
"RefID": "CVE-2021-22600",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-22600",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4028",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0330",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-centos to version 5.14.0.68-alt1.el9. \nSecurity Fix(es):\n\n * BDU:2022-00680: Уязвимость функции package_set_ring компонента net/packet/af_packet.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе или вызвать отказ в обслуживании\n\n * BDU:2022-05890: Уязвимость драйвера GPU i915 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2021-22600: A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755\n\n * CVE-2021-4028: A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.\n\n * CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-02-23"
},
"Updated": {
"Date": "2022-02-23"
},
"BDUs": [
{
"ID": "BDU:2022-00680",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-00680",
"Impact": "High",
"Public": "20211215"
},
{
"ID": "BDU:2022-05890",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://bdu.fstec.ru/vul/2022-05890",
"Impact": "High",
"Public": "20220125"
}
],
"CVEs": [
{
"ID": "CVE-2021-22600",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-22600",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "CVE-2021-4028",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4028",
"Impact": "High",
"Public": "20220824"
},
{
"ID": "CVE-2022-0330",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
"Impact": "High",
"Public": "20220325"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221365001",
"Comment": "kernel-headers-centos is earlier than 0:5.14.0.68-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221365002",
"Comment": "kernel-headers-modules-centos is earlier than 0:5.14.0.68-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221365003",
"Comment": "kernel-image-centos is earlier than 0:5.14.0.68-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221365004",
"Comment": "kernel-modules-alsa-centos is earlier than 0:5.14.0.68-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221365005",
"Comment": "kernel-modules-drm-centos is earlier than 0:5.14.0.68-alt1.el9"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221365006",
"Comment": "kernel-modules-media-centos is earlier than 0:5.14.0.68-alt1.el9"
}
]
}
]
}
}
]
}