2024-06-28 13:17:52 +00:00

472 lines
24 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20231044",
"Version": "oval:org.altlinux.errata:def:20231044",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-1044: package `kernel-image-un-def` update to version 5.15.87-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-1044",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1044",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-07218",
"RefURL": "https://bdu.fstec.ru/vul/2022-07218",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07336",
"RefURL": "https://bdu.fstec.ru/vul/2022-07336",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07505",
"RefURL": "https://bdu.fstec.ru/vul/2022-07505",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07506",
"RefURL": "https://bdu.fstec.ru/vul/2022-07506",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07508",
"RefURL": "https://bdu.fstec.ru/vul/2022-07508",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00061",
"RefURL": "https://bdu.fstec.ru/vul/2023-00061",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00164",
"RefURL": "https://bdu.fstec.ru/vul/2023-00164",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00359",
"RefURL": "https://bdu.fstec.ru/vul/2023-00359",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00361",
"RefURL": "https://bdu.fstec.ru/vul/2023-00361",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01111",
"RefURL": "https://bdu.fstec.ru/vul/2023-01111",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01112",
"RefURL": "https://bdu.fstec.ru/vul/2023-01112",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01122",
"RefURL": "https://bdu.fstec.ru/vul/2023-01122",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01746",
"RefURL": "https://bdu.fstec.ru/vul/2023-01746",
"Source": "BDU"
},
{
"RefID": "CVE-2022-3424",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3424",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3545",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4139",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45934",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45934",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47518",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47518",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47519",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47519",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47521",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47521",
"Source": "CVE"
},
{
"RefID": "CVE-2022-48424",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-48424",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0210",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0210",
"Source": "CVE"
},
{
"RefID": "CVE-2023-26544",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26544",
"Source": "CVE"
},
{
"RefID": "CVE-2023-26605",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26605",
"Source": "CVE"
},
{
"RefID": "CVE-2023-26606",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26606",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 5.15.87-alt1. \nSecurity Fix(es):\n\n * BDU:2022-07218: Уязвимость функции l2cap_config_req (net/bluetooth/l2cap_core.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-07336: Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-07505: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-07506: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-07508: Уязвимость драйвера беспроводной сети WILC1000 ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-00061: Уязвимость драйвера GPU i915 ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2023-00164: Уязвимость функции ksmbd_decode_ntlmssp_auth_blob модуля ksmbd ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00359: Уязвимость драйвера drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00361: Уязвимость функций gru_set_context_option(), gru_fault() и gru_handle_user_call_os() драйвера SGI GRU ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-01111: Уязвимость функции inode_cgwb_move_to_attached() компонента fs/fs-writeback.c ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01112: Уязвимость функции ntfs_trim_fs() компонента fs/ntfs3/bitmap.c ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01122: Уязвимость функции run_unpack() компонента fs/ntfs3/run.c ядра операционных систем Linux, позволяющая нарушителю вызвать оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01746: Уязвимость функции ntfs_read_mft() в модуле fs/ntfs3/inode.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2022-3424: A use-after-free flaw was found in the Linux kernels SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-3545: A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.\n\n * CVE-2022-4139: An incorrect TLB flush issue was found in the Linux kernels GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.\n\n * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-45934: An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.\n\n * CVE-2022-47518: An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.\n\n * CVE-2022-47519: An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.\n\n * CVE-2022-47521: An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.\n\n * CVE-2022-48424: In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. An unhandled page fault may occur.\n\n * CVE-2023-0210: A bug affects the Linux kernels ksmbd NTLMv2 authentication and is known to crash the OS immediately in Linux-based systems.\n\n * CVE-2023-26544: In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.\n\n * CVE-2023-26605: In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid.\n\n * CVE-2023-26606: In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c.\n\n * #44690: периодически пропадает звук\n\n * #44813: Проблемы с запуском на asus c201p",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-01-13"
},
"Updated": {
"Date": "2023-01-13"
},
"BDUs": [
{
"ID": "BDU:2022-07218",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-07218",
"Impact": "High",
"Public": "20221126"
},
{
"ID": "BDU:2022-07336",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-474",
"Href": "https://bdu.fstec.ru/vul/2022-07336",
"Impact": "High",
"Public": "20221116"
},
{
"ID": "BDU:2022-07505",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-07505",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2022-07506",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-07506",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2022-07508",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-07508",
"Impact": "High",
"Public": "20221124"
},
{
"ID": "BDU:2023-00061",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-281, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2023-00061",
"Impact": "High",
"Public": "20221130"
},
{
"ID": "BDU:2023-00164",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-00164",
"Impact": "High",
"Public": "20230101"
},
{
"ID": "BDU:2023-00359",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00359",
"Impact": "High",
"Public": "20220811"
},
{
"ID": "BDU:2023-00361",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00361",
"Impact": "High",
"Public": "20221123"
},
{
"ID": "BDU:2023-01111",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01111",
"Impact": "High",
"Public": "20230221"
},
{
"ID": "BDU:2023-01112",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01112",
"Impact": "High",
"Public": "20221112"
},
{
"ID": "BDU:2023-01122",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01122",
"Impact": "High",
"Public": "20230220"
},
{
"ID": "BDU:2023-01746",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-01746",
"Impact": "High",
"Public": "20220930"
}
],
"CVEs": [
{
"ID": "CVE-2022-3424",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3424",
"Impact": "High",
"Public": "20230306"
},
{
"ID": "CVE-2022-3545",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545",
"Impact": "High",
"Public": "20221017"
},
{
"ID": "CVE-2022-4139",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139",
"Impact": "High",
"Public": "20230127"
},
{
"ID": "CVE-2022-4378",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
"Impact": "High",
"Public": "20230105"
},
{
"ID": "CVE-2022-45934",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45934",
"Impact": "High",
"Public": "20221127"
},
{
"ID": "CVE-2022-47518",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47518",
"Impact": "High",
"Public": "20221218"
},
{
"ID": "CVE-2022-47519",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47519",
"Impact": "High",
"Public": "20221218"
},
{
"ID": "CVE-2022-47521",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47521",
"Impact": "High",
"Public": "20221218"
},
{
"ID": "CVE-2022-48424",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-48424",
"Impact": "High",
"Public": "20230319"
},
{
"ID": "CVE-2023-0210",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0210",
"Impact": "High",
"Public": "20230327"
},
{
"ID": "CVE-2023-26544",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26544",
"Impact": "High",
"Public": "20230225"
},
{
"ID": "CVE-2023-26605",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26605",
"Impact": "High",
"Public": "20230226"
},
{
"ID": "CVE-2023-26606",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26606",
"Impact": "High",
"Public": "20230226"
}
],
"Bugzilla": [
{
"ID": "44690",
"Href": "https://bugzilla.altlinux.org/44690",
"Data": "периодически пропадает звук"
},
{
"ID": "44813",
"Href": "https://bugzilla.altlinux.org/44813",
"Data": "Проблемы с запуском на asus c201p"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20231044001",
"Comment": "kernel-doc-un is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044003",
"Comment": "kernel-headers-un-def is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044004",
"Comment": "kernel-image-domU-un-def is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044005",
"Comment": "kernel-image-un-def is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044006",
"Comment": "kernel-image-un-def-checkinstall is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044007",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044008",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.15.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231044010",
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.15.87-alt1"
}
]
}
]
}
}
]
}