vuln-list-alt/oval/c10f1/ALT-PU-2022-3391/definitions.json
2024-06-28 13:17:52 +00:00

145 lines
5.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20223391",
"Version": "oval:org.altlinux.errata:def:20223391",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-3391: package `multipath-tools` update to version 0.9.3-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-3391",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-3391",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-06669",
"RefURL": "https://bdu.fstec.ru/vul/2022-06669",
"Source": "BDU"
},
{
"RefID": "CVE-2022-41973",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41973",
"Source": "CVE"
},
{
"RefID": "CVE-2022-41974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41974",
"Source": "CVE"
}
],
"Description": "This update upgrades multipath-tools to version 0.9.3-alt2. \nSecurity Fix(es):\n\n * BDU:2022-06669: Уязвимость программного обеспечения управления драйверами для организации многопутевого доступа multipath-tools, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии до root-пользователя\n\n * CVE-2022-41973: multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.\n\n * CVE-2022-41974: multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.\n\n * #44440: Обновление multipath-tools 0.9.3\n\n * #44524: Checker 'tur' not found in /usr/lib64/multipath",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-12-21"
},
"Updated": {
"Date": "2022-12-21"
},
"BDUs": [
{
"ID": "BDU:2022-06669",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2022-06669",
"Impact": "High",
"Public": "20221029"
}
],
"CVEs": [
{
"ID": "CVE-2022-41973",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41973",
"Impact": "High",
"Public": "20221029"
},
{
"ID": "CVE-2022-41974",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41974",
"Impact": "High",
"Public": "20221029"
}
],
"Bugzilla": [
{
"ID": "44440",
"Href": "https://bugzilla.altlinux.org/44440",
"Data": "Обновление multipath-tools 0.9.3"
},
{
"ID": "44524",
"Href": "https://bugzilla.altlinux.org/44524",
"Data": "Checker 'tur' not found in /usr/lib64/multipath"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20223391001",
"Comment": "kpartx is earlier than 0:0.9.3-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20223391002",
"Comment": "libdmmp is earlier than 0:0.9.3-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20223391003",
"Comment": "libdmmp-devel is earlier than 0:0.9.3-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20223391004",
"Comment": "libmultipath is earlier than 0:0.9.3-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20223391005",
"Comment": "libmultipath-devel is earlier than 0:0.9.3-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20223391006",
"Comment": "multipath-tools is earlier than 0:0.9.3-alt2"
}
]
}
]
}
}
]
}