vuln-list-alt/oval/p10/ALT-PU-2023-1528/definitions.json
2024-04-16 14:26:14 +00:00

165 lines
7.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20231528",
"Version": "oval:org.altlinux.errata:def:20231528",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-1528: package `cri-o` update to version 1.26.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-1528",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1528",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-03768",
"RefURL": "https://bdu.fstec.ru/vul/2022-03768",
"Source": "BDU"
},
{
"RefID": "CVE-2022-1708",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1708",
"Source": "CVE"
},
{
"RefID": "CVE-2022-27652",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27652",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2995",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2995",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4318",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4318",
"Source": "CVE"
}
],
"Description": "This update upgrades cri-o to version 1.26.2-alt1. \nSecurity Fix(es):\n\n * BDU:2022-03768: Уязвимость программы мониторинга связи между менеджером контейнеров и средой выполнения conmon, связанная с неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2022-1708: A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.\n\n * CVE-2022-27652: A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.\n\n * CVE-2022-2995: Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.\n\n * CVE-2022-4318: A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-03-29"
},
"Updated": {
"Date": "2023-03-29"
},
"BDUs": [
{
"ID": "BDU:2022-03768",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2022-03768",
"Impact": "High",
"Public": "20220607"
}
],
"CVEs": [
{
"ID": "CVE-2022-1708",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1708",
"Impact": "High",
"Public": "20220607"
},
{
"ID": "CVE-2022-27652",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27652",
"Impact": "Low",
"Public": "20220418"
},
{
"ID": "CVE-2022-2995",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2995",
"Impact": "High",
"Public": "20220919"
},
{
"ID": "CVE-2022-4318",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-913",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4318",
"Impact": "High",
"Public": "20230925"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20231528001",
"Comment": "cri-o is earlier than 0:1.26.2-alt1"
}
]
}
]
}
}
]
}