vuln-list-alt/oval/c10f1/ALT-PU-2022-3371/definitions.json
2024-06-28 13:17:52 +00:00

928 lines
50 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20223371",
"Version": "oval:org.altlinux.errata:def:20223371",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-3371: package `kernel-image-rpi-un` update to version 6.1.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-3371",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-3371",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-06459",
"RefURL": "https://bdu.fstec.ru/vul/2022-06459",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06550",
"RefURL": "https://bdu.fstec.ru/vul/2022-06550",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06620",
"RefURL": "https://bdu.fstec.ru/vul/2022-06620",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07074",
"RefURL": "https://bdu.fstec.ru/vul/2022-07074",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07218",
"RefURL": "https://bdu.fstec.ru/vul/2022-07218",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07336",
"RefURL": "https://bdu.fstec.ru/vul/2022-07336",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07343",
"RefURL": "https://bdu.fstec.ru/vul/2022-07343",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07347",
"RefURL": "https://bdu.fstec.ru/vul/2022-07347",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07505",
"RefURL": "https://bdu.fstec.ru/vul/2022-07505",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07506",
"RefURL": "https://bdu.fstec.ru/vul/2022-07506",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07507",
"RefURL": "https://bdu.fstec.ru/vul/2022-07507",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07508",
"RefURL": "https://bdu.fstec.ru/vul/2022-07508",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00061",
"RefURL": "https://bdu.fstec.ru/vul/2023-00061",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00457",
"RefURL": "https://bdu.fstec.ru/vul/2023-00457",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00626",
"RefURL": "https://bdu.fstec.ru/vul/2023-00626",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00627",
"RefURL": "https://bdu.fstec.ru/vul/2023-00627",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00644",
"RefURL": "https://bdu.fstec.ru/vul/2023-00644",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00645",
"RefURL": "https://bdu.fstec.ru/vul/2023-00645",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00646",
"RefURL": "https://bdu.fstec.ru/vul/2023-00646",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00647",
"RefURL": "https://bdu.fstec.ru/vul/2023-00647",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00670",
"RefURL": "https://bdu.fstec.ru/vul/2023-00670",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01192",
"RefURL": "https://bdu.fstec.ru/vul/2023-01192",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01274",
"RefURL": "https://bdu.fstec.ru/vul/2023-01274",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01285",
"RefURL": "https://bdu.fstec.ru/vul/2023-01285",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01299",
"RefURL": "https://bdu.fstec.ru/vul/2023-01299",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02406",
"RefURL": "https://bdu.fstec.ru/vul/2023-02406",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02527",
"RefURL": "https://bdu.fstec.ru/vul/2023-02527",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02604",
"RefURL": "https://bdu.fstec.ru/vul/2023-02604",
"Source": "BDU"
},
{
"RefID": "CVE-2022-3344",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3344",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3541",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3541",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3543",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3543",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3565",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3565",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3594",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3595",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3640",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3707",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4139",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"Source": "CVE"
},
{
"RefID": "CVE-2022-42896",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
"Source": "CVE"
},
{
"RefID": "CVE-2022-44032",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44032",
"Source": "CVE"
},
{
"RefID": "CVE-2022-44033",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44033",
"Source": "CVE"
},
{
"RefID": "CVE-2022-44034",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-44034",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45869",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45869",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45884",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45884",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45885",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45885",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45886",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45886",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45887",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45887",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45888",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45888",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45919",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45919",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45934",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45934",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47518",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47518",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47519",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47519",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47520",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47520",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47521",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47521",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0468",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0468",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0469",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0469",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0590",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1195",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1382",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2006",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2006",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2166",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2166",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2236",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2236",
"Source": "CVE"
},
{
"RefID": "CVE-2023-22998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rpi-un to version 6.1.0-alt1. \nSecurity Fix(es):\n\n * BDU:2022-06459: Уязвимость функций unix_sock_destructor() и unix_release_sock() подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06550: Уязвимость функции l2cap_conn_del() (net/bluetooth/l2cap_core.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06620: Уязвимость функции del_timer компонента drivers/isdn/mISDN/l1oip_core.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07074: Уязвимость функций l2cap_connect и l2cap_le_connect_req (net/bluetooth/l2cap_core.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07218: Уязвимость функции l2cap_config_req (net/bluetooth/l2cap_core.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07336: Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07343: Уязвимость функции intr_callback() (drivers/net/usb/r8152.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07347: Уязвимость компонента drivers/char/pcmcia/scr24x_cs.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07505: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-07506: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-07507: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить уровень привилегий\n\n * BDU:2022-07508: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-00061: Уязвимость драйвера GPU i915 ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2023-00457: Уязвимость файла fs/io_uring.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00626: Уязвимость функции qdisc_graft (net/sched/sch_api.c) подсистемы управления трафиком ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00627: Уязвимость функции io_install_fixed_file() модуля io_uring/filetable.c подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00644: Уязвимость драйвера DVB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00645: Уязвимость драйвера DVB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00646: Уязвимость драйвера DVB (drivers/media/dvb-core/dvb_frontend.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.\n\n * BDU:2023-00647: Уязвимость драйвера DVB (drivers/media/dvb-core/dvbdev.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00670: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01192: Уязвимость функции drm_gem_shmem_get_sg_table (drivers/gpu/drm/virtio/virtgpu_object.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01274: Уязвимость функции cifs_put_tcp_session() (fs/cifs/connect.c) подсистемы SMB ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01285: Уязвимость реализации протокола TIPC (Transparent Inter Process Communication) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01299: Уязвимость подсистемы KVM AMD для поддержки вложенной виртуализации SVM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02406: Уязвимость функции io_install_fixed_file() подсистемы io_uring ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2023-02527: Уязвимость функции can_rcv_filter() в модуле net/can/af_can.c ядра операционной системы Linux в функции can_rcv_filter(), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02604: Уязвимость функции rxrpc_unbundle_conn() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2022-3344: A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0).\n\n * CVE-2022-3541: A vulnerability classified as critical has been found in Linux Kernel. This affects the function spl2sw_nvmem_get_mac_address of the file drivers/net/ethernet/sunplus/spl2sw_driver.c of the component BPF. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211041 was assigned to this vulnerability.\n\n * CVE-2022-3543: A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor/unix_release_sock of the file net/unix/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043.\n\n * CVE-2022-3565: A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.\n\n * CVE-2022-3594: A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.\n\n * CVE-2022-3595: A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.\n\n * CVE-2022-3640: A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.\n\n * CVE-2022-3707: A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.\n\n * CVE-2022-4139: An incorrect TLB flush issue was found in the Linux kernels GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.\n\n * CVE-2022-42896: There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.\n\nWe recommend upgrading past commit  https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url \n\n\n\n * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-44032: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().\n\n * CVE-2022-44033: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().\n\n * CVE-2022-44034: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().\n\n * CVE-2022-45869: A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.\n\n * CVE-2022-45884: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.\n\n * CVE-2022-45885: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.\n\n * CVE-2022-45886: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.\n\n * CVE-2022-45887: An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.\n\n * CVE-2022-45888: An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.\n\n * CVE-2022-45919: An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.\n\n * CVE-2022-45934: An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.\n\n * CVE-2022-47518: An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.\n\n * CVE-2022-47519: An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.\n\n * CVE-2022-47520: An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.\n\n * CVE-2022-47521: An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.\n\n * CVE-2023-0468: A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.\n\n * CVE-2023-0469: A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.\n\n * CVE-2023-0590: A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.\n\n * CVE-2023-1195: A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-\u003ehostname to NULL, leading to an invalid pointer request.\n\n * CVE-2023-1382: A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.\n\n * CVE-2023-2006: A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.\n\n * CVE-2023-2166: A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.\n\n * CVE-2023-2236: A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nBoth io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.\n\n\n\n * CVE-2023-22998: In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-12-20"
},
"Updated": {
"Date": "2022-12-20"
},
"BDUs": [
{
"ID": "BDU:2022-06459",
"CVSS": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-401, CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-06459",
"Impact": "Low",
"Public": "20220929"
},
{
"ID": "BDU:2022-06550",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06550",
"Impact": "High",
"Public": "20221020"
},
{
"ID": "BDU:2022-06620",
"CVSS": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-06620",
"Impact": "High",
"Public": "20211017"
},
{
"ID": "BDU:2022-07074",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-07074",
"Impact": "High",
"Public": "20221123"
},
{
"ID": "BDU:2022-07218",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-07218",
"Impact": "High",
"Public": "20221126"
},
{
"ID": "BDU:2022-07336",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-474",
"Href": "https://bdu.fstec.ru/vul/2022-07336",
"Impact": "High",
"Public": "20221116"
},
{
"ID": "BDU:2022-07343",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404, CWE-779",
"Href": "https://bdu.fstec.ru/vul/2022-07343",
"Impact": "High",
"Public": "20221018"
},
{
"ID": "BDU:2022-07347",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2022-07347",
"Impact": "Low",
"Public": "20221029"
},
{
"ID": "BDU:2022-07505",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-07505",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2022-07506",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-07506",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2022-07507",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-07507",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2022-07508",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-07508",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2023-00061",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2023-00061",
"Impact": "High",
"Public": "20221130"
},
{
"ID": "BDU:2023-00457",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-00457",
"Impact": "Low",
"Public": "20221125"
},
{
"ID": "BDU:2023-00626",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00626",
"Impact": "Low",
"Public": "20221019"
},
{
"ID": "BDU:2023-00627",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00627",
"Impact": "Low",
"Public": "20221125"
},
{
"ID": "BDU:2023-00644",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00644",
"Impact": "High",
"Public": "20221115"
},
{
"ID": "BDU:2023-00645",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00645",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2023-00646",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00646",
"Impact": "High",
"Public": "20221115"
},
{
"ID": "BDU:2023-00647",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00647",
"Impact": "High",
"Public": "20221115"
},
{
"ID": "BDU:2023-00670",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2023-00670",
"Impact": "Low",
"Public": "20221123"
},
{
"ID": "BDU:2023-01192",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253, CWE-436",
"Href": "https://bdu.fstec.ru/vul/2023-01192",
"Impact": "Low",
"Public": "20220719"
},
{
"ID": "BDU:2023-01274",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416, CWE-457",
"Href": "https://bdu.fstec.ru/vul/2023-01274",
"Impact": "Low",
"Public": "20221027"
},
{
"ID": "BDU:2023-01285",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-01285",
"Impact": "Low",
"Public": "20221121"
},
{
"ID": "BDU:2023-01299",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-440",
"Href": "https://bdu.fstec.ru/vul/2023-01299",
"Impact": "Low",
"Public": "20221024"
},
{
"ID": "BDU:2023-02406",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02406",
"Impact": "High",
"Public": "20221125"
},
{
"ID": "BDU:2023-02527",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-02527",
"Impact": "Low",
"Public": "20221207"
},
{
"ID": "BDU:2023-02604",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2023-02604",
"Impact": "High",
"Public": "20220114"
}
],
"CVEs": [
{
"ID": "CVE-2022-3344",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-440",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3344",
"Impact": "Low",
"Public": "20221025"
},
{
"ID": "CVE-2022-3541",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3541",
"Impact": "High",
"Public": "20221017"
},
{
"ID": "CVE-2022-3543",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3543",
"Impact": "Low",
"Public": "20221017"
},
{
"ID": "CVE-2022-3565",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-662",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3565",
"Impact": "High",
"Public": "20221017"
},
{
"ID": "CVE-2022-3594",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594",
"Impact": "Low",
"Public": "20221018"
},
{
"ID": "CVE-2022-3595",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595",
"Impact": "Low",
"Public": "20221018"
},
{
"ID": "CVE-2022-3640",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640",
"Impact": "High",
"Public": "20221021"
},
{
"ID": "CVE-2022-3707",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707",
"Impact": "Low",
"Public": "20230306"
},
{
"ID": "CVE-2022-4139",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"Impact": "High",
"Public": "20230127"
},
{
"ID": "CVE-2022-42896",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896",
"Impact": "High",
"Public": "20221123"
},
{
"ID": "CVE-2022-4378",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
"Impact": "High",
"Public": "20230105"
},
{
"ID": "CVE-2022-44032",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44032",
"Impact": "Low",
"Public": "20221030"
},
{
"ID": "CVE-2022-44033",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44033",
"Impact": "Low",
"Public": "20221030"
},
{
"ID": "CVE-2022-44034",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-44034",
"Impact": "Low",
"Public": "20221030"
},
{
"ID": "CVE-2022-45869",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45869",
"Impact": "Low",
"Public": "20221130"
},
{
"ID": "CVE-2022-45884",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45884",
"Impact": "High",
"Public": "20221125"
},
{
"ID": "CVE-2022-45885",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45885",
"Impact": "High",
"Public": "20221125"
},
{
"ID": "CVE-2022-45886",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45886",
"Impact": "High",
"Public": "20221125"
},
{
"ID": "CVE-2022-45887",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45887",
"Impact": "Low",
"Public": "20221125"
},
{
"ID": "CVE-2022-45888",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45888",
"Impact": "Low",
"Public": "20221125"
},
{
"ID": "CVE-2022-45919",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45919",
"Impact": "High",
"Public": "20221127"
},
{
"ID": "CVE-2022-45934",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45934",
"Impact": "High",
"Public": "20221127"
},
{
"ID": "CVE-2022-47518",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47518",
"Impact": "High",
"Public": "20221218"
},
{
"ID": "CVE-2022-47519",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47519",
"Impact": "High",
"Public": "20221218"
},
{
"ID": "CVE-2022-47520",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47520",
"Impact": "High",
"Public": "20221218"
},
{
"ID": "CVE-2022-47521",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47521",
"Impact": "High",
"Public": "20221218"
},
{
"ID": "CVE-2023-0468",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0468",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0469",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0469",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0590",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590",
"Impact": "Low",
"Public": "20230323"
},
{
"ID": "CVE-2023-1195",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195",
"Impact": "Low",
"Public": "20230518"
},
{
"ID": "CVE-2023-1382",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382",
"Impact": "Low",
"Public": "20230419"
},
{
"ID": "CVE-2023-2006",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2006",
"Impact": "High",
"Public": "20230424"
},
{
"ID": "CVE-2023-2166",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2166",
"Impact": "Low",
"Public": "20230419"
},
{
"ID": "CVE-2023-2236",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2236",
"Impact": "High",
"Public": "20230501"
},
{
"ID": "CVE-2023-22998",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-436",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998",
"Impact": "Low",
"Public": "20230228"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20223371001",
"Comment": "kernel-headers-modules-rpi-un is earlier than 1:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20223371002",
"Comment": "kernel-headers-rpi-un is earlier than 1:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20223371003",
"Comment": "kernel-image-rpi-un is earlier than 1:6.1.0-alt1"
}
]
}
]
}
}
]
}