714 lines
39 KiB
JSON
714 lines
39 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20213358",
|
||
"Version": "oval:org.altlinux.errata:def:20213358",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-3358: package `kernel-image-un-def` update to version 5.15.5-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p11"
|
||
],
|
||
"Products": [
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-3358",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3358",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03902",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03902",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04802",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04802",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04803",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04803",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04804",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04804",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06349",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06349",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06351",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06351",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00095",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00095",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01512",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01512",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01725",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01725",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03142",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03142",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03402",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03402",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03928",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03928",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04444",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04444",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05378",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05378",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05648",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05648",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05684",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05684",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05887",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05887",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05888",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05888",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00362",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00362",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01197",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01197",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02304",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02304",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02450",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02450",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20320",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20320",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20321",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20321",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20322",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28714",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28714",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-28715",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28715",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3640",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3640",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3744",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3752",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3753",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3753",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3772",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4083",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4149",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4149",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4150",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4150",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4203",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43975",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43975",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-43976",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45868",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45868",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0322",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0480",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0480",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1508",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1508",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2991",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2991",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-un-def to version 5.15.5-alt1. \nSecurity Fix(es):\n\n * BDU:2021-03902: Уязвимость функции sco_sock_sendmsg() подсистемы HCI ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы или повысить свои привилегии\n\n * BDU:2021-04802: Уязвимость криптодрайвера ccp-ops ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04803: Уязвимость подсистемы Bluetooth ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы\n\n * BDU:2021-04804: Уязвимость функции vt_k_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-06349: Уязвимость функции mwifiex_usb_recv (drivers/net/wireless/marvell/mwifiex/usb.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.\n\n * BDU:2021-06351: Уязвимость функции hw_atl_utils_fw_rpc_wait (drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00095: Уязвимость реализации функций close() и fget() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-01512: Уязвимость компонента fs/quota/quota_tree.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01725: Уязвимость функции add_partition ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03142: Уязвимость реализации протокола ICMP ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-03402: Уязвимость функции sock_getsockopt() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03928: Уязвимость функции btrfs_alloc_tree_b (fs/btrfs/extent-tree.c) файловой системы btrfs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04444: Уязвимость драйвера netback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05378: Уязвимость драйвера netback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05648: Уязвимость функции sctp_make_strreset_req (net/sctp/sm_make_chunk.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05684: Уязвимость подсистемы OverlayFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05887: Уязвимость верификатора ebpf компонента bpf_map_update_elem и bpf_map_freeze (kernel/bpf/syscall.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2022-05888: Уязвимость компонента bpf_jit_insn (arch/s390/net/bpf_jit_comp.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2023-00362: Уязвимость функции filelock_init механизма блокировок (fs/locks.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01197: Уязвимость подсистемы io_uring в модуле fs/io_uring.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2023-02304: Уязвимость подсистемы LightNVM ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код\n\n * BDU:2023-02450: Уязвимость реализации протокола SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании (закрыть соединение)\n\n * CVE-2021-20320: A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.\n\n * CVE-2021-20321: A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.\n\n * CVE-2021-20322: A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.\n\n * CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)\n\n * CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)\n\n * CVE-2021-3640: A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.\n\n * CVE-2021-3744: A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.\n\n * CVE-2021-3752: A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2021-3753: A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.\n\n * CVE-2021-3772: A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.\n\n * CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.\n\n * CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.\n\n * CVE-2021-4149: A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.\n\n * CVE-2021-4150: A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.\n\n * CVE-2021-4203: A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.\n\n * CVE-2021-43975: In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.\n\n * CVE-2021-43976: In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).\n\n * CVE-2021-45868: In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.\n\n * CVE-2022-0322: A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).\n\n * CVE-2022-0480: A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.\n\n * CVE-2022-1508: An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.\n\n * CVE-2022-2991: A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-11-25"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-11-25"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2021-03902",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03902",
|
||
"Impact": "High",
|
||
"Public": "20210722"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04802",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04802",
|
||
"Impact": "Low",
|
||
"Public": "20210924"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04803",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04803",
|
||
"Impact": "Low",
|
||
"Public": "20210914"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04804",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125, CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04804",
|
||
"Impact": "Low",
|
||
"Public": "20210830"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06349",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06349",
|
||
"Impact": "Low",
|
||
"Public": "20211031"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06351",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06351",
|
||
"Impact": "High",
|
||
"Public": "20211113"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00095",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00095",
|
||
"Impact": "High",
|
||
"Public": "20211201"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01512",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01512",
|
||
"Impact": "Critical",
|
||
"Public": "20211008"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01725",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01725",
|
||
"Impact": "Low",
|
||
"Public": "20210907"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03142",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-330",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03142",
|
||
"Impact": "High",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03402",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03402",
|
||
"Impact": "Low",
|
||
"Public": "20210927"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03928",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03928",
|
||
"Impact": "Low",
|
||
"Public": "20211018"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04444",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-404, CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04444",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05378",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-404, CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05378",
|
||
"Impact": "Low",
|
||
"Public": "20220105"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05648",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-681, CWE-704",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05648",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05684",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05684",
|
||
"Impact": "Low",
|
||
"Public": "20210924"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05887",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:N/I:C/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-367",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05887",
|
||
"Impact": "Low",
|
||
"Public": "20211109"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05888",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05888",
|
||
"Impact": "Low",
|
||
"Public": "20210902"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00362",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00362",
|
||
"Impact": "Low",
|
||
"Public": "20210903"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01197",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01197",
|
||
"Impact": "Low",
|
||
"Public": "20210903"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02304",
|
||
"CVSS": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02304",
|
||
"Impact": "Low",
|
||
"Public": "20210814"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02450",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-354",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02450",
|
||
"Impact": "Low",
|
||
"Public": "20220302"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2021-20320",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20320",
|
||
"Impact": "Low",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20321",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20321",
|
||
"Impact": "Low",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20322",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-330",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
|
||
"Impact": "High",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28714",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28714",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-28715",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28715",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3640",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3640",
|
||
"Impact": "High",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3744",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
|
||
"Impact": "Low",
|
||
"Public": "20220304"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3752",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
|
||
"Impact": "High",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3753",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3753",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3772",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
|
||
"Impact": "Low",
|
||
"Public": "20220302"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4001",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-367",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4001",
|
||
"Impact": "Low",
|
||
"Public": "20220121"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4083",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
|
||
"Impact": "High",
|
||
"Public": "20220118"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4149",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4149",
|
||
"Impact": "Low",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4150",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4150",
|
||
"Impact": "Low",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4203",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43975",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43975",
|
||
"Impact": "Low",
|
||
"Public": "20211117"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-43976",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
|
||
"Impact": "Low",
|
||
"Public": "20211117"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45868",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45868",
|
||
"Impact": "Low",
|
||
"Public": "20220318"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0322",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0480",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0480",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1508",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1508",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2991",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2991",
|
||
"Impact": "Low",
|
||
"Public": "20220825"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:container:11"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358001",
|
||
"Comment": "kernel-doc-un is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358002",
|
||
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358003",
|
||
"Comment": "kernel-headers-un-def is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358004",
|
||
"Comment": "kernel-image-domU-un-def is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358005",
|
||
"Comment": "kernel-image-un-def is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358006",
|
||
"Comment": "kernel-image-un-def-checkinstall is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358007",
|
||
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358008",
|
||
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358009",
|
||
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.15.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213358010",
|
||
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.15.5-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |