2024-04-16 14:26:14 +00:00

186 lines
7.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222067",
"Version": "oval:org.altlinux.errata:def:20222067",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2067: package `kernel-image-std-def` update to version 5.4.198-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2067",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2067",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-03283",
"RefURL": "https://bdu.fstec.ru/vul/2022-03283",
"Source": "BDU"
},
{
"RefID": "CVE-2022-32250",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3577",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3577",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-def to version 5.4.198-alt1. \nSecurity Fix(es):\n\n * BDU:2022-03283: Уязвимость функции nft_expr_init программного обеспечения фильтрации пакетов Netfilter ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии до уровня root\n\n * CVE-2022-32250: net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.\n\n * CVE-2022-3577: An out-of-bounds memory write flaw was found in the Linux kernels Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-06-17"
},
"Updated": {
"Date": "2022-06-17"
},
"BDUs": [
{
"ID": "BDU:2022-03283",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-03283",
"Impact": "High",
"Public": "20220526"
}
],
"CVEs": [
{
"ID": "CVE-2022-32250",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"Impact": "High",
"Public": "20220602"
},
{
"ID": "CVE-2022-3577",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3577",
"Impact": "High",
"Public": "20221020"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222067001",
"Comment": "kernel-doc-std is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067002",
"Comment": "kernel-headers-modules-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067003",
"Comment": "kernel-headers-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067004",
"Comment": "kernel-image-domU-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067005",
"Comment": "kernel-image-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067006",
"Comment": "kernel-modules-drm-ancient-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067007",
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067008",
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067009",
"Comment": "kernel-modules-drm-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067010",
"Comment": "kernel-modules-ide-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067011",
"Comment": "kernel-modules-midgard-be-m1000-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067012",
"Comment": "kernel-modules-staging-std-def is earlier than 2:5.4.198-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222067013",
"Comment": "kernel-modules-v4l-std-def is earlier than 2:5.4.198-alt1"
}
]
}
]
}
}
]
}