2024-12-12 21:07:30 +00:00

98 lines
3.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213306",
"Version": "oval:org.altlinux.errata:def:20213306",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3306: package `kernel-image-std-kvm` update to version 5.10.80-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3306",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3306",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-01273",
"RefURL": "https://bdu.fstec.ru/vul/2023-01273",
"Source": "BDU"
},
{
"RefID": "CVE-2023-1252",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1252",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-kvm to version 5.10.80-alt1. \nSecurity Fix(es):\n\n * BDU:2023-01273: Уязвимость функции ovl_write_iter() файловой системы overlayfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * CVE-2023-1252: A use-after-free flaw was found in the Linux kernels Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 (\"ovl: fix use after free in struct ovl_aio_req\") not applied yet, the kernel could be affected.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-11-19"
},
"Updated": {
"Date": "2021-11-19"
},
"BDUs": [
{
"ID": "BDU:2023-01273",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01273",
"Impact": "High",
"Public": "20211029"
}
],
"CVEs": [
{
"ID": "CVE-2023-1252",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1252",
"Impact": "High",
"Public": "20230323"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213306001",
"Comment": "kernel-image-std-kvm is earlier than 0:5.10.80-alt1"
}
]
}
]
}
}
]
}