2024-12-18 09:06:35 +00:00

979 lines
52 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221175",
"Version": "oval:org.altlinux.errata:def:20221175",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1175: package `kernel-image-mp` update to version 5.16.4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1175",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1175",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00822",
"RefURL": "https://bdu.fstec.ru/vul/2022-00822",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02325",
"RefURL": "https://bdu.fstec.ru/vul/2022-02325",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02443",
"RefURL": "https://bdu.fstec.ru/vul/2022-02443",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02677",
"RefURL": "https://bdu.fstec.ru/vul/2022-02677",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02885",
"RefURL": "https://bdu.fstec.ru/vul/2022-02885",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02999",
"RefURL": "https://bdu.fstec.ru/vul/2022-02999",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03404",
"RefURL": "https://bdu.fstec.ru/vul/2022-03404",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04266",
"RefURL": "https://bdu.fstec.ru/vul/2022-04266",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05010",
"RefURL": "https://bdu.fstec.ru/vul/2022-05010",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05417",
"RefURL": "https://bdu.fstec.ru/vul/2022-05417",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05692",
"RefURL": "https://bdu.fstec.ru/vul/2022-05692",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05997",
"RefURL": "https://bdu.fstec.ru/vul/2022-05997",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07326",
"RefURL": "https://bdu.fstec.ru/vul/2022-07326",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07327",
"RefURL": "https://bdu.fstec.ru/vul/2022-07327",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07328",
"RefURL": "https://bdu.fstec.ru/vul/2022-07328",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07329",
"RefURL": "https://bdu.fstec.ru/vul/2022-07329",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07330",
"RefURL": "https://bdu.fstec.ru/vul/2022-07330",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07331",
"RefURL": "https://bdu.fstec.ru/vul/2022-07331",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07332",
"RefURL": "https://bdu.fstec.ru/vul/2022-07332",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07333",
"RefURL": "https://bdu.fstec.ru/vul/2022-07333",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07334",
"RefURL": "https://bdu.fstec.ru/vul/2022-07334",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07335",
"RefURL": "https://bdu.fstec.ru/vul/2022-07335",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07336",
"RefURL": "https://bdu.fstec.ru/vul/2022-07336",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07337",
"RefURL": "https://bdu.fstec.ru/vul/2022-07337",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00359",
"RefURL": "https://bdu.fstec.ru/vul/2023-00359",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00629",
"RefURL": "https://bdu.fstec.ru/vul/2023-00629",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01200",
"RefURL": "https://bdu.fstec.ru/vul/2023-01200",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01210",
"RefURL": "https://bdu.fstec.ru/vul/2023-01210",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01212",
"RefURL": "https://bdu.fstec.ru/vul/2023-01212",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01217",
"RefURL": "https://bdu.fstec.ru/vul/2023-01217",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01492",
"RefURL": "https://bdu.fstec.ru/vul/2023-01492",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02532",
"RefURL": "https://bdu.fstec.ru/vul/2023-02532",
"Source": "BDU"
},
{
"RefID": "CVE-2021-4002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4090",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4095",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4135",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4155",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4202",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
"Source": "CVE"
},
{
"RefID": "CVE-2021-44879",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
"Source": "CVE"
},
{
"RefID": "CVE-2021-45402",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0264",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0433",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1195",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
"Source": "CVE"
},
{
"RefID": "CVE-2022-26878",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3104",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3105",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3106",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3107",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3108",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3110",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3111",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3112",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3113",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3114",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3115",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3545",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40476",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41858",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0459",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0461",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
"Source": "CVE"
},
{
"RefID": "CVE-2023-22999",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23001",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23003",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.16.4-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00822: Уязвимость функции check_alu_op() (kernel/bpf/verifier.c) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02325: Уязвимость функции gc_data_segment (fs/f2fs/gc.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02443: Уязвимость подсистемы прямого доступа к памяти DMA (Direct memory access) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02677: Уязвимость функции в drivers/bluetooth/virtio_bt.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02885: Уязвимость драйверов drivers/net/hamradio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02999: Уязвимость функции map_get_next_key операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03404: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04266: Уязвимость функции nci_request (net/nfc/nci/core.c) интерфейса контроллера NFC (NCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-05010: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05417: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к устройству\n\n * BDU:2022-05692: Уязвимость функции shmget() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-05997: Уязвимость компонента fs/io_uring.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07326: Уязвимость функции _rtw_init_xmit_priv в модуле drivers/staging/r8188eu/core/rtw_xmit.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07327: Уязвимость функции free_charger_irq() в модуле drivers/power/supply/wm8350_power.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07328: Уязвимость функции ef100_update_stats в модуле drivers/net/hyperv/netvsc_drv.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07329: Уязвимость функции kfd_parse_subtype_iolink в модуле drivers/gpu/drm/amd/amdkfd/kfd_crat.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07330: Уязвимость функции ef100_update_stats в модуле drivers/net/ethernet/sfc/ef100_nic.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07331: Уязвимость функции amvdec_set_canvases() в модуле drivers/staging/media/meson/vdec/vdec_helpers.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07332: Уязвимость функции lkdtm_ARRAY_BOUNDS модуля drivers/misc/lkdtm/bugs.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.\n\n * BDU:2022-07333: Уязвимость функции uapi_finalize() в модуле drivers/infiniband/core/uverbs_uapi.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07334: Уязвимость функции imx_register_uart_clocks() в модуле drivers/clk/imx/clk.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07335: Уязвимость функции malidp_crtc_reset() в модуле drivers/gpu/drm/arm/malidp_crtc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07336: Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07337: Уязвимость функции mtk_vcodec_fw_vpu_init() в модуле drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00359: Уязвимость драйвера drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00629: Уязвимость функции sl_tx_timeout() в модуле drivers/net/slip.c драйвера SLIP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01200: Уязвимость реализации протокола Upper Level Protocol (ULP) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-01210: Уязвимость функции dwc3_qcom_probe() (drivers/usb/dwc3/dwc3-qcom.c) драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01212: Уязвимость функции ufs_mtk_init_va09_pwr_ctrl() (drivers/scsi/ufs/ufs-mediatek.c) драйвера UFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01217: Уязвимость драйвера drivers/bluetooth/hci_qca.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01492: Уязвимость функции expr__ctx_new() (tools/perf/util/expr.c) утилиты perf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * BDU:2023-02532: Уязвимость функции _copy_from_user() в модуле lib/usercopy.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2021-4002: A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4090: An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.\n\n * CVE-2021-4095: A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2021-4135: A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4155: A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.\n\n * CVE-2021-4202: A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.\n\n * CVE-2021-44879: In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.\n\n * CVE-2021-45402: The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"\n\n * CVE-2022-0264: A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6\n\n * CVE-2022-0433: A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0854: A memory leak flaw was found in the Linux kernels DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.\n\n * CVE-2022-1195: A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.\n\n * CVE-2022-26878: drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).\n\n * CVE-2022-3104: An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3105: An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().\n\n * CVE-2022-3106: An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().\n\n * CVE-2022-3107: An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.\n\n * CVE-2022-3108: An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().\n\n * CVE-2022-3110: An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.\n\n * CVE-2022-3111: An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().\n\n * CVE-2022-3112: An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3113: An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3114: An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3115: An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3545: A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.\n\n * CVE-2022-40476: A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2022-41858: A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.\n\n * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2023-0459: Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47\n\n * CVE-2023-0461: There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c\n\n * CVE-2023-22999: In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23001: In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23002: In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23003: In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-01-31"
},
"Updated": {
"Date": "2022-01-31"
},
"BDUs": [
{
"ID": "BDU:2022-00822",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-119, CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-00822",
"Impact": "Low",
"Public": "20211216"
},
{
"ID": "BDU:2022-02325",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-02325",
"Impact": "Low",
"Public": "20211210"
},
{
"ID": "BDU:2022-02443",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-02443",
"Impact": "Low",
"Public": "20220214"
},
{
"ID": "BDU:2022-02677",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401, CWE-772",
"Href": "https://bdu.fstec.ru/vul/2022-02677",
"Impact": "Low",
"Public": "20211020"
},
{
"ID": "BDU:2022-02885",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02885",
"Impact": "Low",
"Public": "20220221"
},
{
"ID": "BDU:2022-02999",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2022-02999",
"Impact": "Low",
"Public": "20211229"
},
{
"ID": "BDU:2022-03404",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-03404",
"Impact": "Low",
"Public": "20220107"
},
{
"ID": "BDU:2022-04266",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-04266",
"Impact": "High",
"Public": "20211117"
},
{
"ID": "BDU:2022-05010",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-755",
"Href": "https://bdu.fstec.ru/vul/2022-05010",
"Impact": "Low",
"Public": "20211214"
},
{
"ID": "BDU:2022-05417",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-05417",
"Impact": "Low",
"Public": "20211215"
},
{
"ID": "BDU:2022-05692",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-05692",
"Impact": "Low",
"Public": "20220303"
},
{
"ID": "BDU:2022-05997",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-05997",
"Impact": "Low",
"Public": "20220623"
},
{
"ID": "BDU:2022-07326",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07326",
"Impact": "Low",
"Public": "20220518"
},
{
"ID": "BDU:2022-07327",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07327",
"Impact": "Low",
"Public": "20220303"
},
{
"ID": "BDU:2022-07328",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07328",
"Impact": "Low",
"Public": "20220314"
},
{
"ID": "BDU:2022-07329",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-252",
"Href": "https://bdu.fstec.ru/vul/2022-07329",
"Impact": "Low",
"Public": "20220105"
},
{
"ID": "BDU:2022-07330",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07330",
"Impact": "Low",
"Public": "20211215"
},
{
"ID": "BDU:2022-07331",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07331",
"Impact": "Low",
"Public": "20220303"
},
{
"ID": "BDU:2022-07332",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07332",
"Impact": "Low",
"Public": "20220120"
},
{
"ID": "BDU:2022-07333",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07333",
"Impact": "Low",
"Public": "20211231"
},
{
"ID": "BDU:2022-07334",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07334",
"Impact": "Low",
"Public": "20220412"
},
{
"ID": "BDU:2022-07335",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07335",
"Impact": "Low",
"Public": "20211214"
},
{
"ID": "BDU:2022-07336",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-474",
"Href": "https://bdu.fstec.ru/vul/2022-07336",
"Impact": "High",
"Public": "20221116"
},
{
"ID": "BDU:2022-07337",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-07337",
"Impact": "Low",
"Public": "20211215"
},
{
"ID": "BDU:2023-00359",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00359",
"Impact": "High",
"Public": "20220811"
},
{
"ID": "BDU:2023-00629",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00629",
"Impact": "High",
"Public": "20220406"
},
{
"ID": "BDU:2023-01200",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01200",
"Impact": "High",
"Public": "20230104"
},
{
"ID": "BDU:2023-01210",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01210",
"Impact": "Low",
"Public": "20220106"
},
{
"ID": "BDU:2023-01212",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01212",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "BDU:2023-01217",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01217",
"Impact": "Low",
"Public": "20220106"
},
{
"ID": "BDU:2023-01492",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-252, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01492",
"Impact": "High",
"Public": "20230301"
},
{
"ID": "BDU:2023-02532",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-203, CWE-264, CWE-763",
"Href": "https://bdu.fstec.ru/vul/2023-02532",
"Impact": "Low",
"Public": "20230221"
}
],
"CVEs": [
{
"ID": "CVE-2021-4002",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"Impact": "Low",
"Public": "20220303"
},
{
"ID": "CVE-2021-4090",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
"Impact": "High",
"Public": "20220218"
},
{
"ID": "CVE-2021-4095",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
"Impact": "Low",
"Public": "20220310"
},
{
"ID": "CVE-2021-4135",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
"Impact": "Low",
"Public": "20220714"
},
{
"ID": "CVE-2021-4155",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-131",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
"Impact": "Low",
"Public": "20220824"
},
{
"ID": "CVE-2021-4202",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
"Impact": "High",
"Public": "20220325"
},
{
"ID": "CVE-2021-44879",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
"Impact": "Low",
"Public": "20220214"
},
{
"ID": "CVE-2021-45402",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
"Impact": "Low",
"Public": "20220211"
},
{
"ID": "CVE-2022-0264",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
"Impact": "Low",
"Public": "20220204"
},
{
"ID": "CVE-2022-0433",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
"Impact": "Low",
"Public": "20220310"
},
{
"ID": "CVE-2022-0854",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
"Impact": "Low",
"Public": "20220323"
},
{
"ID": "CVE-2022-1195",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
"Impact": "Low",
"Public": "20220429"
},
{
"ID": "CVE-2022-26878",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
"Impact": "Low",
"Public": "20220311"
},
{
"ID": "CVE-2022-3104",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3105",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3106",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3107",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3108",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-252",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3110",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3111",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3112",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3113",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3114",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3115",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
"Impact": "Low",
"Public": "20221214"
},
{
"ID": "CVE-2022-3545",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545",
"Impact": "High",
"Public": "20221017"
},
{
"ID": "CVE-2022-40476",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476",
"Impact": "Low",
"Public": "20220914"
},
{
"ID": "CVE-2022-41858",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858",
"Impact": "High",
"Public": "20230117"
},
{
"ID": "CVE-2022-4378",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
"Impact": "High",
"Public": "20230105"
},
{
"ID": "CVE-2023-0459",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-763",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"Impact": "Low",
"Public": "20230525"
},
{
"ID": "CVE-2023-0461",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
"Impact": "High",
"Public": "20230228"
},
{
"ID": "CVE-2023-22999",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
"Impact": "Low",
"Public": "20230228"
},
{
"ID": "CVE-2023-23001",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
"Impact": "Low",
"Public": "20230301"
},
{
"ID": "CVE-2023-23002",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
"Impact": "Low",
"Public": "20230301"
},
{
"ID": "CVE-2023-23003",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-252",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
"Impact": "Low",
"Public": "20230301"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221175001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.16.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221175002",
"Comment": "kernel-headers-mp is earlier than 0:5.16.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221175003",
"Comment": "kernel-image-mp is earlier than 0:5.16.4-alt1"
}
]
}
]
}
}
]
}