2024-12-12 21:07:30 +00:00

375 lines
19 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221467",
"Version": "oval:org.altlinux.errata:def:20221467",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1467: package `kernel-image-std-def` update to version 5.10.104-alt0.c9f.2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1467",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1467",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00680",
"RefURL": "https://bdu.fstec.ru/vul/2022-00680",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00737",
"RefURL": "https://bdu.fstec.ru/vul/2022-00737",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01166",
"RefURL": "https://bdu.fstec.ru/vul/2022-01166",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01472",
"RefURL": "https://bdu.fstec.ru/vul/2022-01472",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02564",
"RefURL": "https://bdu.fstec.ru/vul/2022-02564",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02968",
"RefURL": "https://bdu.fstec.ru/vul/2022-02968",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03368",
"RefURL": "https://bdu.fstec.ru/vul/2022-03368",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03863",
"RefURL": "https://bdu.fstec.ru/vul/2022-03863",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05848",
"RefURL": "https://bdu.fstec.ru/vul/2022-05848",
"Source": "BDU"
},
{
"RefID": "CVE-2021-22600",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-22600",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0185",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0435",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0492",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0847",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0998",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1998",
"Source": "CVE"
},
{
"RefID": "CVE-2022-29156",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29156",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2938",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2938",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2964",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-def to version 5.10.104-alt0.c9f.2. \nSecurity Fix(es):\n\n * BDU:2022-00680: Уязвимость функции package_set_ring компонента net/packet/af_packet.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе или вызвать отказ в обслуживании\n\n * BDU:2022-00737: Уязвимость функции cgroup_release_agent_write (kernel/cgroup/cgroup-v1.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе или вызвать отказ в обслуживании\n\n * BDU:2022-01166: Уязвимость функций copy_page_to_iter_pipe и push_pipe ядра операционной системы Linux, позволяющая нарушителю перезаписать содержимое страничного кэша произвольных файлов\n\n * BDU:2022-01472: Уязвимость функции legacy_parse_param ядра операционной системы Linux, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02564: Уязвимость реализации сетевого протокола TIPC операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-02968: Уязвимость функции rtrs_clt_dev_release (drivers/infiniband/ulp/rtrs/rtrs-clt.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03368: Уязвимость функции vhost_vdpa_config_validate() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-03863: Уязвимость реализации функции copy_info_records_to_user() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05848: Уязвимость драйвера ядра операционной системы Linux для устройств USB 2.0/3.0 Gigabit Ethernet на базе ASIX AX88179_178A, позволяющая нарушителю получить потенциально конфиденциальную информацию\n\n * CVE-2021-22600: A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755\n\n * CVE-2022-0185: A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.\n\n * CVE-2022-0435: A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.\n\n * CVE-2022-0492: A vulnerability was found in the Linux kernels cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.\n\n * CVE-2022-0847: A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.\n\n * CVE-2022-0998: An integer overflow flaw was found in the Linux kernels virtio device driver code in the way a user triggers the vhost_vdpa_config_validate function. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-1998: A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.\n\n * CVE-2022-29156: drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.\n\n * CVE-2022-2938: A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.\n\n * CVE-2022-2964: A flaw was found in the Linux kernels driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-03-11"
},
"Updated": {
"Date": "2022-03-11"
},
"BDUs": [
{
"ID": "BDU:2022-00680",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-00680",
"Impact": "High",
"Public": "20211215"
},
{
"ID": "BDU:2022-00737",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://bdu.fstec.ru/vul/2022-00737",
"Impact": "High",
"Public": "20220120"
},
{
"ID": "BDU:2022-01166",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281, CWE-665",
"Href": "https://bdu.fstec.ru/vul/2022-01166",
"Impact": "High",
"Public": "20220307"
},
{
"ID": "BDU:2022-01472",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-01472",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "BDU:2022-02564",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-02564",
"Impact": "High",
"Public": "20220210"
},
{
"ID": "BDU:2022-02968",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-02968",
"Impact": "High",
"Public": "20220218"
},
{
"ID": "BDU:2022-03368",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-03368",
"Impact": "High",
"Public": "20220330"
},
{
"ID": "BDU:2022-03863",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03863",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-05848",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05848",
"Impact": "High",
"Public": "20220909"
}
],
"CVEs": [
{
"ID": "CVE-2021-22600",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-22600",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "CVE-2022-0185",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-191",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "CVE-2022-0435",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"Impact": "High",
"Public": "20220325"
},
{
"ID": "CVE-2022-0492",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"Impact": "High",
"Public": "20220303"
},
{
"ID": "CVE-2022-0847",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847",
"Impact": "High",
"Public": "20220310"
},
{
"ID": "CVE-2022-0998",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0998",
"Impact": "High",
"Public": "20220330"
},
{
"ID": "CVE-2022-1998",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1998",
"Impact": "High",
"Public": "20220609"
},
{
"ID": "CVE-2022-29156",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29156",
"Impact": "High",
"Public": "20220413"
},
{
"ID": "CVE-2022-2938",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2938",
"Impact": "High",
"Public": "20220823"
},
{
"ID": "CVE-2022-2964",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"Impact": "High",
"Public": "20220909"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221467001",
"Comment": "kernel-doc-std is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467002",
"Comment": "kernel-headers-modules-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467003",
"Comment": "kernel-headers-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467004",
"Comment": "kernel-image-domU-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467005",
"Comment": "kernel-image-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467006",
"Comment": "kernel-modules-drm-ancient-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467007",
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467008",
"Comment": "kernel-modules-drm-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467009",
"Comment": "kernel-modules-ide-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467010",
"Comment": "kernel-modules-midgard-be-m1000-std-def is earlier than 2:5.10.104-alt0.c9f.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221467011",
"Comment": "kernel-modules-staging-std-def is earlier than 2:5.10.104-alt0.c9f.2"
}
]
}
]
}
}
]
}