vuln-list-alt/oval/p11/ALT-PU-2022-1971/definitions.json
2024-12-12 21:07:30 +00:00

135 lines
5.2 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221971",
"Version": "oval:org.altlinux.errata:def:20221971",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1971: package `kernel-image-mp` update to version 5.17.12-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1971",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1971",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-03921",
"RefURL": "https://bdu.fstec.ru/vul/2022-03921",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04244",
"RefURL": "https://bdu.fstec.ru/vul/2022-04244",
"Source": "BDU"
},
{
"RefID": "CVE-2022-1652",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1652",
"Source": "CVE"
},
{
"RefID": "CVE-2022-32296",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.17.12-alt1. \nSecurity Fix(es):\n\n * BDU:2022-03921: Уязвимость ядра операционной системы Linux, связанная с недостаточной энтропией, позволяющая нарушителю идентифицировать клиентов\n\n * BDU:2022-04244: Уязвимость функции bad_flp_intr ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2022-1652: Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.\n\n * CVE-2022-32296: The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-05-30"
},
"Updated": {
"Date": "2022-05-30"
},
"BDUs": [
{
"ID": "BDU:2022-03921",
"CVSS": "AV:N/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-203, CWE-330, CWE-331",
"Href": "https://bdu.fstec.ru/vul/2022-03921",
"Impact": "Low",
"Public": "20220518"
},
{
"ID": "BDU:2022-04244",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-04244",
"Impact": "High",
"Public": "20220602"
}
],
"CVEs": [
{
"ID": "CVE-2022-1652",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1652",
"Impact": "High",
"Public": "20220602"
},
{
"ID": "CVE-2022-32296",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296",
"Impact": "Low",
"Public": "20220605"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221971001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.17.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221971002",
"Comment": "kernel-headers-mp is earlier than 0:5.17.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221971003",
"Comment": "kernel-image-mp is earlier than 0:5.17.12-alt1"
}
]
}
]
}
}
]
}