1965 lines
106 KiB
JSON
1965 lines
106 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20221647",
|
||
"Version": "oval:org.altlinux.errata:def:20221647",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2022-1647: package `kernel-image-rpi-un` update to version 5.17.1-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p11"
|
||
],
|
||
"Products": [
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2022-1647",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1647",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00622",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00622",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00790",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00790",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00822",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00822",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00823",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00823",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00833",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00833",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00888",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00888",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00889",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00889",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00891",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00891",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00899",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00899",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01249",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01249",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01499",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01499",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01567",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01567",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01597",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01597",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01629",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01629",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01630",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01630",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01644",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01644",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02325",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02325",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02328",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02328",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02362",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02362",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02387",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02387",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02443",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02443",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02677",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02677",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02703",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02703",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02816",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02816",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02885",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02885",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02999",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02999",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03404",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03404",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03409",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03409",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04266",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04266",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05010",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05010",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05417",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05417",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05692",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05692",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05717",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05717",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05723",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05723",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05777",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05777",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05794",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05794",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05852",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05852",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05890",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05890",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05997",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05997",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06397",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06397",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06399",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06399",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07326",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07326",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07327",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07327",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07328",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07328",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07329",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07329",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07330",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07330",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07331",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07331",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07332",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07332",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07333",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07333",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07334",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07334",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07335",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07335",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07336",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07336",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07337",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07337",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00359",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00359",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01191",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01191",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01200",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01200",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01210",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01210",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01211",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01211",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01212",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01212",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01217",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01217",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01298",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01298",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01492",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01492",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02164",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02164",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02532",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02532",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35501",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3743",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3847",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4090",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4095",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4135",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4155",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4202",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-44879",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45402",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0264",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0330",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0382",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0433",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0494",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0500",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0500",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0516",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0617",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0854",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0995",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0995",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1011",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1015",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1016",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1048",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1055",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1195",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1198",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1204",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1205",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1353",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-23222",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-23222",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24448",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24958",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-24959",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25258",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25265",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-25375",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26490",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26878",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-26966",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27223",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27666",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-27950",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28356",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-28796",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2977",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2977",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3104",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3105",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3106",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3107",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3108",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3110",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3111",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3112",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3113",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3114",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3115",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3176",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3176",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3545",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40476",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4378",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0459",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0461",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1872",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22995",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22999",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23000",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23002",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23003",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-rpi-un to version 5.17.1-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00622: Уязвимость подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-00790: Уязвимость реализации функции nfs_atomic_open() ядра операционных систем Linux, позволяющая нарушителю оказать влияние на конфиденциальность данных\n\n * BDU:2022-00822: Уязвимость функции check_alu_op() (kernel/bpf/verifier.c) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00823: Уязвимость компонента drivers/usb/gadget/legacy/inode.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00833: Уязвимость компонента drivers/usb/gadget/legacy/inode.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00888: Уязвимость драйвера drivers/usb/gadget/composite.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00889: Уязвимость подсистемы UDF ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00891: Уязвимость драйвера drivers/usb/gadget/function/rndis.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00899: Уязвимость ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01249: Уязвимость параметра len в файле drivers/net/usb/sr9700.c ядра операционных систем семейства Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2022-01499: Уязвимость реализации функции st21nfca_connectivity_event_received() ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2022-01567: Уязвимость модулей esp4 и esp6 ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01597: Уязвимость компонента watch_queue ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код с привилегиями root\n\n * BDU:2022-01629: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-01630: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01644: Уязвимость реализации функции tc_new_tfilter() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-02325: Уязвимость функции gc_data_segment (fs/f2fs/gc.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02328: Уязвимость функции jbd2_journal_wait_updates ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02362: Уязвимость функции BPF_BTF_LOAD() подсистемы eBPF ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-02387: Уязвимость компонента drivers/hid/hid-elo.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02443: Уязвимость подсистемы прямого доступа к памяти DMA (Direct memory access) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02677: Уязвимость функции в drivers/bluetooth/virtio_bt.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02703: Уязвимость драйвера USB-устройства Xilinx (drivers/usb/gadget/udc/udc-xilinx.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02816: Уязвимость функции pfkey_register ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2022-02885: Уязвимость драйверов drivers/net/hamradio ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02999: Уязвимость функции map_get_next_key операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03400: Уязвимость функции scsi_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-03404: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03409: Уязвимость компонента net/llc/af_llc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-04266: Уязвимость функции nci_request (net/nfc/nci/core.c) интерфейса контроллера NFC (NCI) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-05010: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-05417: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к устройству\n\n * BDU:2022-05692: Уязвимость функции shmget() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-05717: Уязвимость звуковой подсистемы ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05723: Уязвимость файловой системы FUSE ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05777: Уязвимость ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2022-05794: Уязвимость функций Signalfd_poll() и binder_poll() ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05852: Уязвимость реализации прокси-виртуализированных TPM-устройств ядра операционной системы Linux, позволяющая нарушителю повысить привилегии в системе\n\n * BDU:2022-05890: Уязвимость драйвера GPU i915 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05997: Уязвимость компонента fs/io_uring.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06397: Уязвимость драйвера drivers/net/hamradio/6pack.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06399: Уязвимость реализации протокола Amateur Radio AX.25 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06400: Уязвимость реализации протокола Amateur Radio AX.25 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07326: Уязвимость функции _rtw_init_xmit_priv в модуле drivers/staging/r8188eu/core/rtw_xmit.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07327: Уязвимость функции free_charger_irq() в модуле drivers/power/supply/wm8350_power.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07328: Уязвимость функции ef100_update_stats в модуле drivers/net/hyperv/netvsc_drv.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07329: Уязвимость функции kfd_parse_subtype_iolink в модуле drivers/gpu/drm/amd/amdkfd/kfd_crat.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07330: Уязвимость функции ef100_update_stats в модуле drivers/net/ethernet/sfc/ef100_nic.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07331: Уязвимость функции amvdec_set_canvases() в модуле drivers/staging/media/meson/vdec/vdec_helpers.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07332: Уязвимость функции lkdtm_ARRAY_BOUNDS модуля drivers/misc/lkdtm/bugs.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.\n\n * BDU:2022-07333: Уязвимость функции uapi_finalize() в модуле drivers/infiniband/core/uverbs_uapi.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07334: Уязвимость функции imx_register_uart_clocks() в модуле drivers/clk/imx/clk.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07335: Уязвимость функции malidp_crtc_reset() в модуле drivers/gpu/drm/arm/malidp_crtc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07336: Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07337: Уязвимость функции mtk_vcodec_fw_vpu_init() в модуле drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00359: Уязвимость драйвера drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01191: Уязвимость драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01200: Уязвимость реализации протокола Upper Level Protocol (ULP) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-01210: Уязвимость функции dwc3_qcom_probe() (drivers/usb/dwc3/dwc3-qcom.c) драйвера Qualcomm USB 3.0 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01211: Уязвимость функции tegra_xusb_find_port_node() (drivers/phy/tegra/xusb.c) драйвера NVIDIA Tegra XUSB Pad ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01212: Уязвимость функции ufs_mtk_init_va09_pwr_ctrl() (drivers/scsi/ufs/ufs-mediatek.c) драйвера UFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01217: Уязвимость драйвера drivers/bluetooth/hci_qca.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01298: Уязвимость подсистемы OverlayFS ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-01492: Уязвимость функции expr__ctx_new() (tools/perf/util/expr.c) утилиты perf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие\n\n * BDU:2023-02164: Уязвимость функции io_file_get_fixed() модуля io_uring/io_uring.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02532: Уязвимость функции _copy_from_user() в модуле lib/usercopy.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2020-35501: A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem\n\n * CVE-2021-3743: An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3847: An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.\n\n * CVE-2021-4002: A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4090: An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.\n\n * CVE-2021-4095: A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2021-4135: A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data.\n\n * CVE-2021-4155: A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.\n\n * CVE-2021-4202: A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.\n\n * CVE-2021-44879: In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.\n\n * CVE-2021-45402: The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"\n\n * CVE-2022-0264: A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6\n\n * CVE-2022-0330: A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.\n\n * CVE-2022-0382: An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0433: A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.\n\n * CVE-2022-0494: A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.\n\n * CVE-2022-0500: A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.\n\n * CVE-2022-0516: A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.\n\n * CVE-2022-0617: A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.\n\n * CVE-2022-0854: A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.\n\n * CVE-2022-0995: An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.\n\n * CVE-2022-1011: A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.\n\n * CVE-2022-1015: A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.\n\n * CVE-2022-1016: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.\n\n * CVE-2022-1048: A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-1055: A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5\n\n * CVE-2022-1195: A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.\n\n * CVE-2022-1198: A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.\n\n * CVE-2022-1204: A use-after-free flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.\n\n * CVE-2022-1205: A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.\n\n * CVE-2022-1353: A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.\n\n * CVE-2022-23222: kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.\n\n * CVE-2022-24448: An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.\n\n * CVE-2022-24958: drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.\n\n * CVE-2022-24959: An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.\n\n * CVE-2022-25258: An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.\n\n * CVE-2022-25265: In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.\n\n * CVE-2022-25375: An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.\n\n * CVE-2022-26490: st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.\n\n * CVE-2022-26878: drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).\n\n * CVE-2022-26966: An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.\n\n * CVE-2022-27223: In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.\n\n * CVE-2022-27666: A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.\n\n * CVE-2022-27950: In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.\n\n * CVE-2022-28356: In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.\n\n * CVE-2022-28796: jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.\n\n * CVE-2022-2977: A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.\n\n * CVE-2022-3104: An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3105: An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().\n\n * CVE-2022-3106: An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().\n\n * CVE-2022-3107: An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.\n\n * CVE-2022-3108: An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().\n\n * CVE-2022-3110: An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.\n\n * CVE-2022-3111: An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().\n\n * CVE-2022-3112: An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3113: An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3114: An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3115: An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.\n\n * CVE-2022-3176: There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659\n\n * CVE-2022-3545: A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.\n\n * CVE-2022-40476: A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2023-0459: Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47\n\n * CVE-2023-0461: There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c\n\n * CVE-2023-1872: A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx-\u003euring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n\n\n * CVE-2023-22995: In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.\n\n * CVE-2023-22999: In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23000: In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.\n\n * CVE-2023-23001: In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23002: In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23003: In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2022-04-07"
|
||
},
|
||
"Updated": {
|
||
"Date": "2022-04-07"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-00622",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00622",
|
||
"Impact": "High",
|
||
"Public": "20211218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00790",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-119, CWE-755, CWE-908, CWE-909",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00790",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00822",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-119, CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00822",
|
||
"Impact": "Low",
|
||
"Public": "20211216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00823",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00823",
|
||
"Impact": "High",
|
||
"Public": "20220103"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00833",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00833",
|
||
"Impact": "Low",
|
||
"Public": "20220125"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00888",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00888",
|
||
"Impact": "High",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00889",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00889",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00891",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-668, CWE-1284",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00891",
|
||
"Impact": "Low",
|
||
"Public": "20220221"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00899",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-913",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00899",
|
||
"Impact": "High",
|
||
"Public": "20210519"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01249",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01249",
|
||
"Impact": "Low",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01499",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01499",
|
||
"Impact": "High",
|
||
"Public": "20220112"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01567",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01567",
|
||
"Impact": "High",
|
||
"Public": "20220307"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01597",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01597",
|
||
"Impact": "High",
|
||
"Public": "20220311"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01629",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:P/I:P/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||
"CWE": "CWE-129, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01629",
|
||
"Impact": "Low",
|
||
"Public": "20220317"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01630",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416, CWE-824",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01630",
|
||
"Impact": "Low",
|
||
"Public": "20220317"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01644",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01644",
|
||
"Impact": "High",
|
||
"Public": "20220201"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02325",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02325",
|
||
"Impact": "Low",
|
||
"Public": "20211210"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02328",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02328",
|
||
"Impact": "High",
|
||
"Public": "20220226"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02362",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02362",
|
||
"Impact": "High",
|
||
"Public": "20211218"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02387",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02387",
|
||
"Impact": "Low",
|
||
"Public": "20220124"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02443",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02443",
|
||
"Impact": "Low",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02677",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401, CWE-772",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02677",
|
||
"Impact": "Low",
|
||
"Public": "20211020"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02703",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02703",
|
||
"Impact": "High",
|
||
"Public": "20220224"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02816",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02816",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02885",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02885",
|
||
"Impact": "Low",
|
||
"Public": "20220221"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02999",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02999",
|
||
"Impact": "Low",
|
||
"Public": "20211229"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03400",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03400",
|
||
"Impact": "Low",
|
||
"Public": "20220111"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03404",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03404",
|
||
"Impact": "Low",
|
||
"Public": "20220107"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03409",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03409",
|
||
"Impact": "Low",
|
||
"Public": "20220402"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-04266",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04266",
|
||
"Impact": "High",
|
||
"Public": "20211117"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05010",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-755",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05010",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05417",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05417",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05692",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05692",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05717",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05717",
|
||
"Impact": "High",
|
||
"Public": "20220322"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05723",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05723",
|
||
"Impact": "High",
|
||
"Public": "20220307"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05777",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05777",
|
||
"Impact": "High",
|
||
"Public": "20210820"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05794",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05794",
|
||
"Impact": "High",
|
||
"Public": "20220916"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05852",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05852",
|
||
"Impact": "High",
|
||
"Public": "20220308"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05890",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05890",
|
||
"Impact": "High",
|
||
"Public": "20220125"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05997",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05997",
|
||
"Impact": "Low",
|
||
"Public": "20220623"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06397",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06397",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06399",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06399",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06400",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06400",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07326",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07326",
|
||
"Impact": "Low",
|
||
"Public": "20220518"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07327",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07327",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07328",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07328",
|
||
"Impact": "Low",
|
||
"Public": "20220314"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07329",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07329",
|
||
"Impact": "Low",
|
||
"Public": "20220105"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07330",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07330",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07331",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07331",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07332",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07332",
|
||
"Impact": "Low",
|
||
"Public": "20220120"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07333",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07333",
|
||
"Impact": "Low",
|
||
"Public": "20211231"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07334",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07334",
|
||
"Impact": "Low",
|
||
"Public": "20220412"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07335",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07335",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07336",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-474",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07336",
|
||
"Impact": "High",
|
||
"Public": "20221116"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07337",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07337",
|
||
"Impact": "Low",
|
||
"Public": "20211215"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00359",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00359",
|
||
"Impact": "High",
|
||
"Public": "20220811"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01191",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01191",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01200",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01200",
|
||
"Impact": "High",
|
||
"Public": "20230104"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01210",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01210",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01211",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01211",
|
||
"Impact": "Low",
|
||
"Public": "20211214"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01212",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01212",
|
||
"Impact": "Low",
|
||
"Public": "20220110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01217",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01217",
|
||
"Impact": "Low",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01298",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01298",
|
||
"Impact": "High",
|
||
"Public": "20230303"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01492",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-252, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01492",
|
||
"Impact": "High",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02164",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02164",
|
||
"Impact": "High",
|
||
"Public": "20220407"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02532",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-203, CWE-264, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02532",
|
||
"Impact": "Low",
|
||
"Public": "20230221"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2020-35501",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35501",
|
||
"Impact": "Low",
|
||
"Public": "20220330"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3743",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
|
||
"Impact": "High",
|
||
"Public": "20220304"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3847",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3847",
|
||
"Impact": "High",
|
||
"Public": "20220401"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4002",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
|
||
"Impact": "Low",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4090",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4090",
|
||
"Impact": "High",
|
||
"Public": "20220218"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4095",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4095",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4135",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4135",
|
||
"Impact": "Low",
|
||
"Public": "20220714"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4155",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-131",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4155",
|
||
"Impact": "Low",
|
||
"Public": "20220824"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4202",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4202",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-44879",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44879",
|
||
"Impact": "Low",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45402",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45402",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0264",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264",
|
||
"Impact": "Low",
|
||
"Public": "20220204"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0330",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0382",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0433",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433",
|
||
"Impact": "Low",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0494",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494",
|
||
"Impact": "Low",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0500",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0500",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0516",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516",
|
||
"Impact": "High",
|
||
"Public": "20220310"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0617",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0854",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854",
|
||
"Impact": "Low",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0995",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0995",
|
||
"Impact": "High",
|
||
"Public": "20220325"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1011",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
|
||
"Impact": "High",
|
||
"Public": "20220318"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1015",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015",
|
||
"Impact": "Low",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1016",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-909",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1048",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048",
|
||
"Impact": "High",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1055",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055",
|
||
"Impact": "High",
|
||
"Public": "20220329"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1195",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195",
|
||
"Impact": "Low",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1198",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1204",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204",
|
||
"Impact": "Low",
|
||
"Public": "20220829"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1205",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205",
|
||
"Impact": "Low",
|
||
"Public": "20220831"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1353",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353",
|
||
"Impact": "High",
|
||
"Public": "20220429"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-23222",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-23222",
|
||
"Impact": "High",
|
||
"Public": "20220114"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24448",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448",
|
||
"Impact": "Low",
|
||
"Public": "20220204"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24958",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-763",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958",
|
||
"Impact": "High",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-24959",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959",
|
||
"Impact": "Low",
|
||
"Public": "20220211"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25258",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258",
|
||
"Impact": "Low",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25265",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-913",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265",
|
||
"Impact": "High",
|
||
"Public": "20220216"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-25375",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-1284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375",
|
||
"Impact": "Low",
|
||
"Public": "20220220"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26490",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490",
|
||
"Impact": "High",
|
||
"Public": "20220306"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26878",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878",
|
||
"Impact": "Low",
|
||
"Public": "20220311"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-26966",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966",
|
||
"Impact": "Low",
|
||
"Public": "20220312"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27223",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223",
|
||
"Impact": "High",
|
||
"Public": "20220316"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27666",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
|
||
"Impact": "High",
|
||
"Public": "20220323"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-27950",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950",
|
||
"Impact": "Low",
|
||
"Public": "20220328"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28356",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356",
|
||
"Impact": "Low",
|
||
"Public": "20220402"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-28796",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796",
|
||
"Impact": "High",
|
||
"Public": "20220408"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-2977",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2977",
|
||
"Impact": "High",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3104",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3105",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3106",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3107",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3108",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3110",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3111",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3112",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3113",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3114",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3115",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115",
|
||
"Impact": "Low",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3176",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3176",
|
||
"Impact": "High",
|
||
"Public": "20220916"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3545",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545",
|
||
"Impact": "High",
|
||
"Public": "20221017"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40476",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476",
|
||
"Impact": "Low",
|
||
"Public": "20220914"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4378",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
|
||
"Impact": "High",
|
||
"Public": "20230105"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0459",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-763",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
|
||
"Impact": "Low",
|
||
"Public": "20230525"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0461",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
|
||
"Impact": "High",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1872",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872",
|
||
"Impact": "High",
|
||
"Public": "20230412"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22995",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995",
|
||
"Impact": "High",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22999",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23000",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23001",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23002",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23003",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003",
|
||
"Impact": "Low",
|
||
"Public": "20230301"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:container:11"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221647001",
|
||
"Comment": "kernel-headers-modules-rpi-un is earlier than 1:5.17.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221647002",
|
||
"Comment": "kernel-headers-rpi-un is earlier than 1:5.17.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221647003",
|
||
"Comment": "kernel-image-rpi-un is earlier than 1:5.17.1-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |