2024-12-12 21:07:30 +00:00

119 lines
4.4 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222148",
"Version": "oval:org.altlinux.errata:def:20222148",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2148: package `kernel-image-mp` update to version 5.18.8-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2148",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2148",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-07480",
"RefURL": "https://bdu.fstec.ru/vul/2022-07480",
"Source": "BDU"
},
{
"RefID": "CVE-2022-1976",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1976",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47940",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47940",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.18.8-alt1. \nSecurity Fix(es):\n\n * BDU:2022-07480: Уязвимость функции smb2_write (fs/ksmbd/smb2pdu.c) модуля ksmbd ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * CVE-2022-1976: A flaw was found in the Linux kernels implementation of IO-URING. This flaw allows an attacker with local executable permission to create a string of requests that can cause a use-after-free flaw within the kernel. This issue leads to memory corruption and possible privilege escalation.\n\n * CVE-2022-47940: An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.18 before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-06-29"
},
"Updated": {
"Date": "2022-06-29"
},
"BDUs": [
{
"ID": "BDU:2022-07480",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-07480",
"Impact": "High",
"Public": "20221223"
}
],
"CVEs": [
{
"ID": "CVE-2022-1976",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1976",
"Impact": "High",
"Public": "20220831"
},
{
"ID": "CVE-2022-47940",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47940",
"Impact": "High",
"Public": "20221223"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222148001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.18.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222148002",
"Comment": "kernel-headers-mp is earlier than 0:5.18.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222148003",
"Comment": "kernel-image-mp is earlier than 0:5.18.8-alt1"
}
]
}
]
}
}
]
}