vuln-list-alt/oval/c10f1/ALT-PU-2022-1540/definitions.json
2024-11-09 03:06:09 +00:00

414 lines
21 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221540",
"Version": "oval:org.altlinux.errata:def:20221540",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1540: package `kernel-image-rpi-un` update to version 5.15.28-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1540",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1540",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00515",
"RefURL": "https://bdu.fstec.ru/vul/2022-00515",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00737",
"RefURL": "https://bdu.fstec.ru/vul/2022-00737",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01166",
"RefURL": "https://bdu.fstec.ru/vul/2022-01166",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01472",
"RefURL": "https://bdu.fstec.ru/vul/2022-01472",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02367",
"RefURL": "https://bdu.fstec.ru/vul/2022-02367",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02383",
"RefURL": "https://bdu.fstec.ru/vul/2022-02383",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02564",
"RefURL": "https://bdu.fstec.ru/vul/2022-02564",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02968",
"RefURL": "https://bdu.fstec.ru/vul/2022-02968",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03863",
"RefURL": "https://bdu.fstec.ru/vul/2022-03863",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05848",
"RefURL": "https://bdu.fstec.ru/vul/2022-05848",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01771",
"RefURL": "https://bdu.fstec.ru/vul/2023-01771",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3773",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4197",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0185",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0435",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0492",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0742",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0742",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0847",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1998",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24122",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24122",
"Source": "CVE"
},
{
"RefID": "CVE-2022-29156",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29156",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2938",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2938",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2964",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rpi-un to version 5.15.28-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00515: Уязвимость ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-00737: Уязвимость функции cgroup_release_agent_write (kernel/cgroup/cgroup-v1.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе или вызвать отказ в обслуживании\n\n * BDU:2022-01166: Уязвимость функций copy_page_to_iter_pipe и push_pipe ядра операционной системы Linux, позволяющая нарушителю перезаписать содержимое страничного кэша произвольных файлов\n\n * BDU:2022-01472: Уязвимость функции legacy_parse_param ядра операционной системы Linux, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02367: Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-02383: Уязвимость реализации сетевого протокола ICMPv6 ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02564: Уязвимость реализации сетевого протокола TIPC операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-02968: Уязвимость функции rtrs_clt_dev_release (drivers/infiniband/ulp/rtrs/rtrs-clt.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03863: Уязвимость реализации функции copy_info_records_to_user() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05848: Уязвимость драйвера ядра операционной системы Linux для устройств USB 2.0/3.0 Gigabit Ethernet на базе ASIX AX88179_178A, позволяющая нарушителю получить потенциально конфиденциальную информацию\n\n * BDU:2023-01771: Уязвимость функции ib_copy_ah_attr_to_user() менеджера соединений RDMA ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * CVE-2021-3773: A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.\n\n * CVE-2021-3923: A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.\n\n * CVE-2021-4197: An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.\n\n * CVE-2022-0185: A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.\n\n * CVE-2022-0435: A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.\n\n * CVE-2022-0492: A vulnerability was found in the Linux kernels cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.\n\n * CVE-2022-0742: Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.\n\n * CVE-2022-0847: A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.\n\n * CVE-2022-1998: A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.\n\n * CVE-2022-24122: kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.\n\n * CVE-2022-29156: drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.\n\n * CVE-2022-2938: A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.\n\n * CVE-2022-2964: A flaw was found in the Linux kernels driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-03-22"
},
"Updated": {
"Date": "2022-03-22"
},
"BDUs": [
{
"ID": "BDU:2022-00515",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00515",
"Impact": "High",
"Public": "20220124"
},
{
"ID": "BDU:2022-00737",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://bdu.fstec.ru/vul/2022-00737",
"Impact": "High",
"Public": "20220120"
},
{
"ID": "BDU:2022-01166",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281, CWE-665",
"Href": "https://bdu.fstec.ru/vul/2022-01166",
"Impact": "High",
"Public": "20220307"
},
{
"ID": "BDU:2022-01472",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-01472",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "BDU:2022-02367",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://bdu.fstec.ru/vul/2022-02367",
"Impact": "High",
"Public": "20220106"
},
{
"ID": "BDU:2022-02383",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-275, CWE-401, CWE-459",
"Href": "https://bdu.fstec.ru/vul/2022-02383",
"Impact": "High",
"Public": "20220303"
},
{
"ID": "BDU:2022-02564",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-02564",
"Impact": "High",
"Public": "20220210"
},
{
"ID": "BDU:2022-02968",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-02968",
"Impact": "High",
"Public": "20220218"
},
{
"ID": "BDU:2022-03863",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03863",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "BDU:2022-05848",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05848",
"Impact": "High",
"Public": "20220909"
},
{
"ID": "BDU:2023-01771",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2023-01771",
"Impact": "Low",
"Public": "20211103"
}
],
"CVEs": [
{
"ID": "CVE-2021-3773",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"Impact": "Critical",
"Public": "20220216"
},
{
"ID": "CVE-2021-3923",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"Impact": "Low",
"Public": "20230327"
},
{
"ID": "CVE-2021-4197",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"Impact": "High",
"Public": "20220323"
},
{
"ID": "CVE-2022-0185",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-191",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "CVE-2022-0435",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435",
"Impact": "High",
"Public": "20220325"
},
{
"ID": "CVE-2022-0492",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492",
"Impact": "High",
"Public": "20220303"
},
{
"ID": "CVE-2022-0742",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0742",
"Impact": "High",
"Public": "20220318"
},
{
"ID": "CVE-2022-0847",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847",
"Impact": "High",
"Public": "20220310"
},
{
"ID": "CVE-2022-1998",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1998",
"Impact": "High",
"Public": "20220609"
},
{
"ID": "CVE-2022-24122",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24122",
"Impact": "High",
"Public": "20220129"
},
{
"ID": "CVE-2022-29156",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29156",
"Impact": "High",
"Public": "20220413"
},
{
"ID": "CVE-2022-2938",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2938",
"Impact": "High",
"Public": "20220823"
},
{
"ID": "CVE-2022-2964",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964",
"Impact": "High",
"Public": "20220909"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221540001",
"Comment": "kernel-headers-modules-rpi-un is earlier than 1:5.15.28-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221540002",
"Comment": "kernel-headers-rpi-un is earlier than 1:5.15.28-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221540003",
"Comment": "kernel-image-rpi-un is earlier than 1:5.15.28-alt1"
}
]
}
]
}
}
]
}