2453 lines
158 KiB
JSON
2453 lines
158 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20244843",
|
||
"Version": "oval:org.altlinux.errata:def:20244843",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2024-4843: package `kernel-image-rpi-un` update to version 6.1.77-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p10"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2024-4843",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-4843",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05657",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05657",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05658",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05658",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07339",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07339",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07509",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07509",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00164",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00164",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00358",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00358",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00361",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00361",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00378",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00378",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00379",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00379",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00380",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00380",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00382",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00382",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00383",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00383",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00747",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00747",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00749",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00749",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01112",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01112",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01122",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01122",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01129",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01129",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01205",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01205",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01209",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01209",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01218",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01218",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01280",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01280",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01281",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01281",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01292",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01292",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01571",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01571",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01572",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01572",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01745",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01745",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01746",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01746",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01780",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01780",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01793",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01793",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01795",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01795",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01799",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01799",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02097",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02097",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02163",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02163",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02165",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02165",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02407",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02407",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02515",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02515",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02580",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02580",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02605",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02605",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02624",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02624",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02625",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02625",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02740",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02740",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02742",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02742",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02744",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02744",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02746",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02746",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02747",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02747",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02749",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02749",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02750",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02750",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02995",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02995",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03172",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03172",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03444",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03444",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03501",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03501",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03502",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03502",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03584",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03584",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03677",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03677",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03778",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03778",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03785",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03785",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03947",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03947",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03951",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03951",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03952",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03952",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03953",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03953",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03954",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03954",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03955",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03955",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03956",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03956",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03957",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03957",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-03961",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-03961",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04466",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04466",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-04653",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-04653",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-05369",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-05369",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-05389",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-05389",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-05390",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-05390",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-05391",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-05391",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-08958",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-08958",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01186",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01186",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01187",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01187",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01590",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01590",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01670",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01670",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01676",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01676",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01838",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01838",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01844",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01844",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01848",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01848",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01851",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01851",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01852",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01852",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01858",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01858",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01866",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01866",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01867",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01867",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01924",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01924",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-2196",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-3424",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3424",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38457",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38457",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-40133",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40133",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4379",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4379",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-47929",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-48423",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-48423",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-48424",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-48424",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-48502",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-48502",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0045",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0045",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0179",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0179",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0210",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0210",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0266",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0266",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0386",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0386",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0458",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0458",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1077",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1077",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1078",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1078",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1118",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1118",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1281",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1380",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1380",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1583",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1583",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1611",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1611",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1652",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1652",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1670",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1670",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1829",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1829",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1989",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2156",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2156",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2163",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2163",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2235",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2235",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-22997",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22997",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23454",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23455",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23455",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-23559",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23559",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-25012",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25012",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-26242",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26242",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-26544",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26544",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-26545",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26545",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-26606",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26606",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28466",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28466",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-31248",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-31248",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3141",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3141",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-31436",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-31436",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32233",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32247",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32247",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32248",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32248",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32250",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32250",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32252",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32252",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32254",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32254",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32257",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32257",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32258",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32258",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-32269",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32269",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3269",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3269",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3390",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3390",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-35001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-35826",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35826",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-35828",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35828",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-35829",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35829",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3610",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3610",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-38426",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38426",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-38427",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38427",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-38428",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38428",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-38429",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38429",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-38430",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38430",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-38431",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38431",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-38432",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38432",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-4004",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4004",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-4015",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4015",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-4206",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4206",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-4207",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4207",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-4208",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4208",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-4622",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4622",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52438",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52438",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52439",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52439",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52440",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52440",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52441",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52441",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52443",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52443",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52444",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52444",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52445",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52445",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52447",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52447",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52448",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52448",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52449",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52449",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-52451",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-52451",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-6817",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-6817",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-1085",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1085",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-1086",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-1086",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-26588",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-26588",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-26589",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-26589",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2024-26591",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-26591",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-rpi-un to version 6.1.77-alt1. \nSecurity Fix(es):\n\n * BDU:2022-05657: Уязвимость функции vmw_cmd_res_check драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_execbuf.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-05658: Уязвимость функции vmw_execbuf_tie_context драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_execbuf.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-07339: Уязвимость драйвера файловой системы NFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07509: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ и повысить свои привилегии\n\n * BDU:2023-00164: Уязвимость функции ksmbd_decode_ntlmssp_auth_blob модуля ksmbd ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00358: Уязвимость функции qdisc_graft (net/sched/sch_api.c) подсистемы управления трафиком ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании.\n\n * BDU:2023-00361: Уязвимость функций gru_set_context_option(), gru_fault() и gru_handle_user_call_os() драйвера SGI GRU ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00378: Уязвимость функции atm_tc_enqueue() подсистемы приоритизации отправки сетевых пакетов (net/sched/sch_atm.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00379: Уязвимость функции cbq_classify() подсистемы приоритизации отправки сетевых пакетов (net/sched/sch_cbq.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00380: Уязвимость драйвера drivers/net/wireless/rndis_wlan.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-00382: Уязвимость компонента ALSA:pcm (звуковой подсистемы) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-00383: Уязвимость компонентa netfilter ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и повысить свои привилегии.\n\n * BDU:2023-00747: Уязвимость драйвера drivers/hid/hid-bigbenff.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00749: Уязвимость функции ib_prctl_set() ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации.\n\n * BDU:2023-01112: Уязвимость функции ntfs_trim_fs() компонента fs/ntfs3/bitmap.c ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01122: Уязвимость функции run_unpack() компонента fs/ntfs3/run.c ядра операционных систем Linux, позволяющая нарушителю вызвать оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01129: Уязвимость механизма MPLS (Multiprotocol Label Switching) ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-01205: Уязвимость функции rds_rm_zerocopy_callback() в модуле net/rds/message.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01209: Уязвимость функций module_gzip_decompress() и module_xz_decompress() в модуле kernel/module/decompress.c подсистемы загрузки модулей ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01218: Уязвимость функции ene_remove() (drivers/media/rc/ene_ir.c) драйвера инфракрасного приемника\\передатчика ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-01280: Уязвимость функции _pick_next_task_rt() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01281: Уязвимость функции brcmf_get_assoc_ies() драйвера drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-01292: Уязвимость функции afu_mmio_region_get_by_offset (drivers/fpga/dfl-afu-region.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01571: Уязвимость функции tcf_exts_exec() фильтра индексирования системы контроля трафика tcindex ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-01572: Уязвимость функции stat() подсистемы OverlayFS ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-01745: Уязвимость функции mi_enum_attr() в модуле fs/ntfs3/record.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01746: Уязвимость функции ntfs_read_mft() в модуле fs/ntfs3/inode.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01780: Уязвимость функции xirc2ps_detach() драйвера сетевого адаптера Xircom 16-bit PCMCIA (PC-card) операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2023-01793: Уязвимость функции io_file_bitmap_get() (io_uring/filetable.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01795: Уязвимость сервера NFS (Network File System) ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-01799: Уязвимость файловой системы btrfs ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-02097: Уязвимость реализации протокола TLS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02163: Уязвимость функции btsdio_remove() модуля drivers\\bluetooth\\btsdio.c драйвера Bluetooth ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02165: Уязвимость фильтра индексирования системы контроля трафика tcindex (net/sched/cls_tcindex.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02407: Уязвимость функции perf_group_detach() утилиты perf ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02515: Уязвимость функции do_prlimit() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-02580: Уязвимость реализации протокола IPv6 RPL ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02605: Уязвимость функции qfq_change_class() ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-02624: Уязвимость реализации сетевого протокола NET/ROM ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2023-02625: Уязвимость функции nf_tables_commit() в модуле net/netfilter/nf_tables_api.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных или повысить свои привилегии в системе и выполнить произвольный код\n\n * BDU:2023-02740: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-02742: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-02744: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02746: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02747: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-02749: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность защищаемой информации и выполнить произвольный код\n\n * BDU:2023-02750: Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02995: Уязвимость функции ntfs_set_ea() в модуле fs/ntfs3/xattr.c драйвера файловой системы ntfs ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03172: Уязвимость функции r592_remove() в модуле drivers/memstick/host/r592.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации\n\n * BDU:2023-03444: Уязвимость функции rkvdec_remove() в модуле drivers/staging/media/rkvdec/rkvdec.c драйвера Rockchip Video Decoder ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03501: Уязвимость функции renesas_usb3_remove() в модуле drivers/usb/gadget/udc/renesas_usb3.c драйвера USB устройств Renesas ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03502: Уязвимость cedrus_remove() в модуле drivers/staging/media/sunxi/cedrus/cedrus.c драйвера Allwinner sunXi ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03584: Уязвимость подсистемы управления памятью StackRot ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2023-03677: Уязвимость подсистемы Netfilter ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03778: Уязвимость функции nft_byteorder_eval() в модуле net/netfilter/nft_byteorder.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03785: Уязвимость функции backtrack_insn() в модуле kernel/bpf/verifier.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03947: Уязвимость функции nft_chain_lookup_byid() в модуле net/netfilter/nf_tables_api.c подсистемы фильтрации пакетов netfilter ядра операционной системы Linux, позволяющая нарушителю повысить привилегии и оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-03951: Уязвимость функции ksmbd_smb2_check_message() в модуле fs/smb/server/smb2misc.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03952: Уязвимость функции ksmbd_conn_handler_loop() в модуле fs/smb/server/connection.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03953: Уязвимость функции ksmbd_verify_smb_message() в модуле fs/smb/server/smb_common.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03954: Уязвимость функции ksmbd_conn_handler_loop() в модуле fs/ksmbd/connection.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03955: Уязвимость функции session_user() в модуле fs/ksmbd/smb2pdu.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03956: Уязвимость функции deassemble_neg_contexts() в модуле fs/smb/server/smb2pdu.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03957: Уязвимость функции smb2_find_context_vals() в модуле fs/ksmbd/oplock.c файловой системы KSMBD ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2023-03961: Уязвимость функции nft_immediate_destroy() в модуле net/netfilter/nft_immediate.c подсистемы Netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных.\n\n * BDU:2023-04466: Уязвимость функции nft_pipapo_remove() в модуле net/netfilter/nft_set_pipapo.c подсистемы netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии\n\n * BDU:2023-04653: Уязвимость функции nft_immediate_deactivate() в модуле net/netfilter/nft_immediate.c сетевого экрана netfilter ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие\n\n * BDU:2023-05369: Уязвимость компонента net/sched: cls_fw ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-05389: Уязвимость функции unix_stream_sendpage() в модуле net/unix/af_unix.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии\n\n * BDU:2023-05390: Уязвимость функции u32_init_knode() в модуле net/sched/cls_u32.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии\n\n * BDU:2023-05391: Уязвимость функции route4_change() в модуле net/sched/cls_route.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации или повысить свои привилегии\n\n * BDU:2023-08958: Уязвимость функции nft_pipapo_walk() в модуле net/netfilter/nft_set_pipapo.c подсистемы Netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации и повысить свои привилегии в системе\n\n * BDU:2024-01186: Уязвимость функции nft_setelem_catchall_deactivate() в модуле net/netfilter/nf_tables_api.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации и повысить свои привилегии\n\n * BDU:2024-01187: Уязвимость функции nft_verdict_init() в модуле net/netfilter/nf_tables_api.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации и повысить свои привилегии\n\n * BDU:2024-01590: Уязвимость функции f2fs_rename() компонента f2fs ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2024-01670: Уязвимость функции ksmbd_decode_ntlmssp_auth_blob() модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-01676: Уязвимость функции init_smb2_rsp_hdr() модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность защищаемой информации\n\n * BDU:2024-01838: Уязвимость функции pvr2_context_disconnect() в модуле drivers/media/usb/pvrusb2/pvrusb2-context.c драйвера Hauppauge WinTV-PVR USB2 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-01844: Уязвимость функции bpf_tracing_prog_attach() в модуле kernel/bpf/syscall.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-01848: Уязвимость функции gfs2_rgrp_dump() в модуле fs/gfs2/rgrp.c файловой системы gfs2 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-01851: Уязвимость функции bpf_map_put() в модуле kernel/bpf/syscall.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-01852: Уязвимость функции dlpar_memory_remove_by_index() драйвера управления памятью powerpc pseries ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-01858: Уязвимость драйвера MTD ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-01866: Уязвимость функции adjust_ptr_min_max_vals() в модуле kernel/bpf/verifier.c ядра операционной системы Linux, позволяющая оказать воздействие на конфиденциальность и доступность защищаемой информации\n\n * BDU:2024-01867: Уязвимость функции unpack_profile() в модуле security/apparmor/policy_unpack.c модуля безопасности AppArmor ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-01924: Уязвимость функции build_insn() модуля arch/loongarch/net/bpf_jit.c компонента BPF ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2022-2196: A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a\n\n\n * CVE-2022-3424: A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2022-38457: A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-40133: A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-4379: A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial\n\n * CVE-2022-47929: In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.\n\n * CVE-2022-48423: In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. An out-of-bounds write may occur.\n\n * CVE-2022-48424: In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. An unhandled page fault may occur.\n\n * CVE-2022-48502: An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.\n\n * CVE-2023-0045: The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n\n\n * CVE-2023-0179: A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.\n\n * CVE-2023-0210: A bug affects the Linux kernel’s ksmbd NTLMv2 authentication and is known to crash the OS immediately in Linux-based systems.\n\n * CVE-2023-0266: A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e\n\n\n * CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.\n\n * CVE-2023-0458: A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11\n\n * CVE-2023-1077: In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.\n\n * CVE-2023-1078: A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.\n\n * CVE-2023-1118: A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.\n\n * CVE-2023-1281: Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.\n\n\n\n * CVE-2023-1380: A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.\n\n * CVE-2023-1583: A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A subsequent request that has auto index selection enabled via IORING_FILE_INDEX_ALLOC can cause a NULL pointer dereference. An unprivileged user can use the flaw to cause a system crash.\n\n * CVE-2023-1611: A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea\n\n * CVE-2023-1652: A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.\n\n * CVE-2023-1670: A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.\n\n * CVE-2023-1829: A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.\n\n\n\n * CVE-2023-1989: A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.\n\n * CVE-2023-2156: A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.\n\n * CVE-2023-2163: Incorrect verifier pruning in BPF in Linux Kernel \u003e=5.4 leads to unsafe\ncode paths being incorrectly marked as safe, resulting in arbitrary read/write in\nkernel memory, lateral privilege escalation, and container escape.\n\n * CVE-2023-2235: A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.\n\nThe perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.\n\n\n\n * CVE-2023-22997: In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).\n\n * CVE-2023-23454: cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).\n\n * CVE-2023-23455: atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).\n\n * CVE-2023-23559: In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.\n\n * CVE-2023-25012: The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.\n\n * CVE-2023-26242: afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow.\n\n * CVE-2023-26544: In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.\n\n * CVE-2023-26545: In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.\n\n * CVE-2023-26606: In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c.\n\n * CVE-2023-28466: do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).\n\n * CVE-2023-31248: Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace\n\n * CVE-2023-3141: A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.\n\n * CVE-2023-31436: qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.\n\n * CVE-2023-32233: In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.\n\n * CVE-2023-32247: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.\n\n * CVE-2023-32248: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.\n\n * CVE-2023-32250: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.\n\n * CVE-2023-32252: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.\n\n * CVE-2023-32254: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.\n\n * CVE-2023-32257: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.\n\n * CVE-2023-32258: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_LOGOFF and SMB2_CLOSE commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.\n\n * CVE-2023-32269: An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.\n\n * CVE-2023-3269: A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.\n\n * CVE-2023-3390: A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.\n\n * CVE-2023-35001: Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace\n\n * CVE-2023-35826: An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in cedrus_remove in drivers/staging/media/sunxi/cedrus/cedrus.c.\n\n * CVE-2023-35828: An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.\n\n * CVE-2023-35829: An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.\n\n * CVE-2023-3610: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.\n\nWe recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.\n\n\n\n * CVE-2023-38426: An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.\n\n * CVE-2023-38427: An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.\n\n * CVE-2023-38428: An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.\n\n * CVE-2023-38429: An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access.\n\n * CVE-2023-38430: An issue was discovered in the Linux kernel before 6.3.9. ksmbd does not validate the SMB request protocol ID, leading to an out-of-bounds read.\n\n * CVE-2023-38431: An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.\n\n * CVE-2023-38432: An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read.\n\n * CVE-2023-4004: A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.\n\n * CVE-2023-4015: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nOn an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used.\n\nWe recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.\n\n\n\n * CVE-2023-4206: A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.\n\nWhen route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.\n\n\n\n * CVE-2023-4207: A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nWhen fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.\n\n\n\n * CVE-2023-4208: A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nWhen u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.\n\n\n\n * CVE-2023-4622: A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.\n\nThe unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.\n\nWe recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.\n\n\n\n * CVE-2023-52438: In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix use-after-free in shinker's callback\n\nThe mmap read lock is used during the shrinker's callback, which means\nthat using alloc-\u003evma pointer isn't safe as it can race with munmap().\nAs of commit dd2283f2605e (\"mm: mmap: zap pages with read mmap_sem in\nmunmap\") the mmap lock is downgraded after the vma has been isolated.\n\nI was able to reproduce this issue by manually adding some delays and\ntriggering page reclaiming through the shrinker's debug sysfs. The\nfollowing KASAN report confirms the UAF:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in zap_page_range_single+0x470/0x4b8\n Read of size 8 at addr ffff356ed50e50f0 by task bash/478\n\n CPU: 1 PID: 478 Comm: bash Not tainted 6.6.0-rc5-00055-g1c8b86a3799f-dirty #70\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n zap_page_range_single+0x470/0x4b8\n binder_alloc_free_page+0x608/0xadc\n __list_lru_walk_one+0x130/0x3b0\n list_lru_walk_node+0xc4/0x22c\n binder_shrink_scan+0x108/0x1dc\n shrinker_debugfs_scan_write+0x2b4/0x500\n full_proxy_write+0xd4/0x140\n vfs_write+0x1ac/0x758\n ksys_write+0xf0/0x1dc\n __arm64_sys_write+0x6c/0x9c\n\n Allocated by task 492:\n kmem_cache_alloc+0x130/0x368\n vm_area_alloc+0x2c/0x190\n mmap_region+0x258/0x18bc\n do_mmap+0x694/0xa60\n vm_mmap_pgoff+0x170/0x29c\n ksys_mmap_pgoff+0x290/0x3a0\n __arm64_sys_mmap+0xcc/0x144\n\n Freed by task 491:\n kmem_cache_free+0x17c/0x3c8\n vm_area_free_rcu_cb+0x74/0x98\n rcu_core+0xa38/0x26d4\n rcu_core_si+0x10/0x1c\n __do_softirq+0x2fc/0xd24\n\n Last potentially related work creation:\n __call_rcu_common.constprop.0+0x6c/0xba0\n call_rcu+0x10/0x1c\n vm_area_free+0x18/0x24\n remove_vma+0xe4/0x118\n do_vmi_align_munmap.isra.0+0x718/0xb5c\n do_vmi_munmap+0xdc/0x1fc\n __vm_munmap+0x10c/0x278\n __arm64_sys_munmap+0x58/0x7c\n\nFix this issue by performing instead a vma_lookup() which will fail to\nfind the vma that was isolated before the mmap lock downgrade. Note that\nthis option has better performance than upgrading to a mmap write lock\nwhich would increase contention. Plus, mmap_write_trylock() has been\nrecently removed anyway.\n\n * CVE-2023-52439: In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(\u0026idev-\u003edev)\nput_device(\u0026idev-\u003edev)\nuio_device_release\n\t\t\t\tget_device(\u0026idev-\u003edev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(\u0026idev-\u003edev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev-\u003edev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic \u0026 inc idev reference with\nminor_lock.\n\n * CVE-2023-52440: In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()\n\nIf authblob-\u003eSessionKey.Length is bigger than session key\nsize(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes.\ncifs_arc4_crypt copy to session key array from SessionKey from client.\n\n * CVE-2023-52441: In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix out of bounds in init_smb2_rsp_hdr()\n\nIf client send smb2 negotiate request and then send smb1 negotiate\nrequest, init_smb2_rsp_hdr is called for smb1 negotiate request since\nneed_neg is set to false. This patch ignore smb1 packets after -\u003eneed_neg\nis set to false.\n\n * CVE-2023-52443: In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \u003cTASK\u003e\n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).\n\n * CVE-2023-52444: In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid dirent corruption\n\nAs Al reported in link[1]:\n\nf2fs_rename()\n...\n\tif (old_dir != new_dir \u0026\u0026 !whiteout)\n\t\tf2fs_set_link(old_inode, old_dir_entry,\n\t\t\t\t\told_dir_page, new_dir);\n\telse\n\t\tf2fs_put_page(old_dir_page, 0);\n\nYou want correct inumber in the \"..\" link. And cross-directory\nrename does move the source to new parent, even if you'd been asked\nto leave a whiteout in the old place.\n\n[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/\n\nWith below testcase, it may cause dirent corruption, due to it missed\nto call f2fs_set_link() to update \"..\" link to new directory.\n- mkdir -p dir/foo\n- renameat2 -w dir/foo bar\n\n[ASSERT] (__chk_dots_dentries:1421) --\u003e Bad inode number[0x4] for '..', parent parent ino is [0x3]\n[FSCK] other corrupted bugs [Fail]\n\n * CVE-2023-52445: In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.\n\n * CVE-2023-52447: In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops-\u003emap_free() in a kworker. But for now, most .map_free() callbacks\ndon't use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops-\u003emap_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.\n\n * CVE-2023-52448: In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd-\u003erd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd-\u003erd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.\n\n * CVE-2023-52449: In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n‘gluebi-\u003edesc’ in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb-\u003enotifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not-\u003eadd()\n ftl_add_mtd tr-\u003eadd_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd-\u003eread()\n gluebi-\u003edesc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi-\u003edesc in the gluebi_get_device(),\nand access gluebi-\u003edesc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.\n\n * CVE-2023-52451: In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n\u0026drmem_info-\u003elmbs[drmem_info-\u003en_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb-\u003ebase_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.\n\n * CVE-2023-6817: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.\n\n\n\n * CVE-2024-1085: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.\n\nWe recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.\n\n\n\n * CVE-2024-1086: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.\n\n\n\n * CVE-2024-26588: In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: BPF: Prevent out-of-bounds memory access\n\nThe test_tag test triggers an unhandled page fault:\n\n # ./test_tag\n [ 130.640218] CPU 0 Unable to handle kernel paging request at virtual address ffff80001b898004, era == 9000000003137f7c, ra == 9000000003139e70\n [ 130.640501] Oops[#3]:\n [ 130.640553] CPU: 0 PID: 1326 Comm: test_tag Tainted: G D O 6.7.0-rc4-loong-devel-gb62ab1a397cf #47 61985c1d94084daa2432f771daa45b56b10d8d2a\n [ 130.640764] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022\n [ 130.640874] pc 9000000003137f7c ra 9000000003139e70 tp 9000000104cb4000 sp 9000000104cb7a40\n [ 130.641001] a0 ffff80001b894000 a1 ffff80001b897ff8 a2 000000006ba210be a3 0000000000000000\n [ 130.641128] a4 000000006ba210be a5 00000000000000f1 a6 00000000000000b3 a7 0000000000000000\n [ 130.641256] t0 0000000000000000 t1 00000000000007f6 t2 0000000000000000 t3 9000000004091b70\n [ 130.641387] t4 000000006ba210be t5 0000000000000004 t6 fffffffffffffff0 t7 90000000040913e0\n [ 130.641512] t8 0000000000000005 u0 0000000000000dc0 s9 0000000000000009 s0 9000000104cb7ae0\n [ 130.641641] s1 00000000000007f6 s2 0000000000000009 s3 0000000000000095 s4 0000000000000000\n [ 130.641771] s5 ffff80001b894000 s6 ffff80001b897fb0 s7 9000000004090c50 s8 0000000000000000\n [ 130.641900] ra: 9000000003139e70 build_body+0x1fcc/0x4988\n [ 130.642007] ERA: 9000000003137f7c build_body+0xd8/0x4988\n [ 130.642112] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n [ 130.642261] PRMD: 00000004 (PPLV0 +PIE -PWE)\n [ 130.642353] EUEN: 00000003 (+FPE +SXE -ASXE -BTE)\n [ 130.642458] ECFG: 00071c1c (LIE=2-4,10-12 VS=7)\n [ 130.642554] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n [ 130.642658] BADV: ffff80001b898004\n [ 130.642719] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\n [ 130.642815] Modules linked in: [last unloaded: bpf_testmod(O)]\n [ 130.642924] Process test_tag (pid: 1326, threadinfo=00000000f7f4015f, task=000000006499f9fd)\n [ 130.643062] Stack : 0000000000000000 9000000003380724 0000000000000000 0000000104cb7be8\n [ 130.643213] 0000000000000000 25af8d9b6e600558 9000000106250ea0 9000000104cb7ae0\n [ 130.643378] 0000000000000000 0000000000000000 9000000104cb7be8 90000000049f6000\n [ 130.643538] 0000000000000090 9000000106250ea0 ffff80001b894000 ffff80001b894000\n [ 130.643685] 00007ffffb917790 900000000313ca94 0000000000000000 0000000000000000\n [ 130.643831] ffff80001b894000 0000000000000ff7 0000000000000000 9000000100468000\n [ 130.643983] 0000000000000000 0000000000000000 0000000000000040 25af8d9b6e600558\n [ 130.644131] 0000000000000bb7 ffff80001b894048 0000000000000000 0000000000000000\n [ 130.644276] 9000000104cb7be8 90000000049f6000 0000000000000090 9000000104cb7bdc\n [ 130.644423] ffff80001b894000 0000000000000000 00007ffffb917790 90000000032acfb0\n [ 130.644572] ...\n [ 130.644629] Call Trace:\n [ 130.644641] [\u003c9000000003137f7c\u003e] build_body+0xd8/0x4988\n [ 130.644785] [\u003c900000000313ca94\u003e] bpf_int_jit_compile+0x228/0x4ec\n [ 130.644891] [\u003c90000000032acfb0\u003e] bpf_prog_select_runtime+0x158/0x1b0\n [ 130.645003] [\u003c90000000032b3504\u003e] bpf_prog_load+0x760/0xb44\n [ 130.645089] [\u003c90000000032b6744\u003e] __sys_bpf+0xbb8/0x2588\n [ 130.645175] [\u003c90000000032b8388\u003e] sys_bpf+0x20/0x2c\n [ 130.645259] [\u003c9000000003f6ab38\u003e] do_syscall+0x7c/0x94\n [ 130.645369] [\u003c9000000003121c5c\u003e] handle_syscall+0xbc/0x158\n [ 130.645507]\n [ 130.645539] Code: 380839f6 380831f9 28412bae \u003c24000ca6\u003e 004081ad 0014cb50 004083e8 02bff34c 58008e91\n [ 130.645729]\n [ 130.646418] ---[ end trace 0000000000000000 ]---\n\nOn my machine, which has CONFIG_PAGE_SIZE_16KB=y, the test failed at\nloading a BPF prog with 2039 instructions:\n\n prog = (struct bpf_prog *)ffff80001b894000\n insn = (struct bpf_insn *)(prog-\u003einsnsi)fff\n---truncated---\n\n * CVE-2024-26589: In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject variable offset alu on PTR_TO_FLOW_KEYS\n\nFor PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off\nfor validation. However, variable offset ptr alu is not prohibited\nfor this ptr kind. So the variable offset is not checked.\n\nThe following prog is accepted:\n\n func#0 @0\n 0: R1=ctx() R10=fp0\n 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx()\n 1: (79) r7 = *(u64 *)(r6 +144) ; R6_w=ctx() R7_w=flow_keys()\n 2: (b7) r8 = 1024 ; R8_w=1024\n 3: (37) r8 /= 1 ; R8_w=scalar()\n 4: (57) r8 \u0026= 1024 ; R8_w=scalar(smin=smin32=0,\n smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))\n 5: (0f) r7 += r8\n mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1\n mark_precise: frame0: regs=r8 stack= before 4: (57) r8 \u0026= 1024\n mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1\n mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024\n 6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off\n =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,\n var_off=(0x0; 0x400))\n 6: (79) r0 = *(u64 *)(r7 +0) ; R0_w=scalar()\n 7: (95) exit\n\nThis prog loads flow_keys to r7, and adds the variable offset r8\nto r7, and finally causes out-of-bounds access:\n\n BUG: unable to handle page fault for address: ffffc90014c80038\n [...]\n Call Trace:\n \u003cTASK\u003e\n bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]\n __bpf_prog_run include/linux/filter.h:651 [inline]\n bpf_prog_run include/linux/filter.h:658 [inline]\n bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]\n bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991\n bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359\n bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]\n __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475\n __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]\n __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFix this by rejecting ptr alu with variable offset on flow_keys.\nApplying the patch rejects the program with \"R7 pointer arithmetic\non flow_keys prohibited\".\n\n * CVE-2024-26591: In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix re-attachment branch in bpf_tracing_prog_attach\n\nThe following case can cause a crash due to missing attach_btf:\n\n1) load rawtp program\n2) load fentry program with rawtp as target_fd\n3) create tracing link for fentry program with target_fd = 0\n4) repeat 3\n\nIn the end we have:\n\n- prog-\u003eaux-\u003edst_trampoline == NULL\n- tgt_prog == NULL (because we did not provide target_fd to link_create)\n- prog-\u003eaux-\u003eattach_btf == NULL (the program was loaded with attach_prog_fd=X)\n- the program was loaded for tgt_prog but we have no way to find out which one\n\n BUG: kernel NULL pointer dereference, address: 0000000000000058\n Call Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x70\n ? page_fault_oops+0x15b/0x430\n ? fixup_exception+0x22/0x330\n ? exc_page_fault+0x6f/0x170\n ? asm_exc_page_fault+0x22/0x30\n ? bpf_tracing_prog_attach+0x279/0x560\n ? btf_obj_id+0x5/0x10\n bpf_tracing_prog_attach+0x439/0x560\n __sys_bpf+0x1cf4/0x2de0\n __x64_sys_bpf+0x1c/0x30\n do_syscall_64+0x41/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nReturn -EINVAL in this situation.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2024-04-15"
|
||
},
|
||
"Updated": {
|
||
"Date": "2024-04-15"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-05657",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05657",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05658",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05658",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07339",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07339",
|
||
"Impact": "High",
|
||
"Public": "20221214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07509",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-200, CWE-1188",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07509",
|
||
"Impact": "High",
|
||
"Public": "20221130"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00164",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-122, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00164",
|
||
"Impact": "High",
|
||
"Public": "20230101"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00358",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00358",
|
||
"Impact": "Low",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00361",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00361",
|
||
"Impact": "High",
|
||
"Public": "20221123"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00378",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-136, CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00378",
|
||
"Impact": "Low",
|
||
"Public": "20230101"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00379",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-136, CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00379",
|
||
"Impact": "Low",
|
||
"Public": "20230101"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00380",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190, CWE-680",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00380",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00382",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00382",
|
||
"Impact": "High",
|
||
"Public": "20230113"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00383",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-121, CWE-125, CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00383",
|
||
"Impact": "High",
|
||
"Public": "20230118"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00747",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00747",
|
||
"Impact": "Low",
|
||
"Public": "20230131"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00749",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-610, CWE-662",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00749",
|
||
"Impact": "High",
|
||
"Public": "20230104"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01112",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01112",
|
||
"Impact": "High",
|
||
"Public": "20221112"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01122",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01122",
|
||
"Impact": "High",
|
||
"Public": "20230220"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01129",
|
||
"CVSS": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01129",
|
||
"Impact": "Critical",
|
||
"Public": "20230213"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01205",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476, CWE-787, CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01205",
|
||
"Impact": "High",
|
||
"Public": "20230209"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01209",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-253, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01209",
|
||
"Impact": "Low",
|
||
"Public": "20221111"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01218",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01218",
|
||
"Impact": "High",
|
||
"Public": "20230208"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01280",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01280",
|
||
"Impact": "High",
|
||
"Public": "20230211"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01281",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01281",
|
||
"Impact": "High",
|
||
"Public": "20230316"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01292",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01292",
|
||
"Impact": "High",
|
||
"Public": "20230219"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01571",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01571",
|
||
"Impact": "High",
|
||
"Public": "20230322"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01572",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-282",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01572",
|
||
"Impact": "High",
|
||
"Public": "20230124"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01745",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-590, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01745",
|
||
"Impact": "High",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01746",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01746",
|
||
"Impact": "High",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01780",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01780",
|
||
"Impact": "Low",
|
||
"Public": "20230317"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01793",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01793",
|
||
"Impact": "Low",
|
||
"Public": "20230321"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01795",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01795",
|
||
"Impact": "High",
|
||
"Public": "20230111"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01799",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01799",
|
||
"Impact": "High",
|
||
"Public": "20230330"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02097",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02097",
|
||
"Impact": "High",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02163",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02163",
|
||
"Impact": "High",
|
||
"Public": "20230323"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02165",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02165",
|
||
"Impact": "High",
|
||
"Public": "20230216"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02407",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02407",
|
||
"Impact": "High",
|
||
"Public": "20230315"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02515",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-203, CWE-264, CWE-385, CWE-476, CWE-514",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02515",
|
||
"Impact": "Low",
|
||
"Public": "20230121"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02580",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-131, CWE-617",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02580",
|
||
"Impact": "High",
|
||
"Public": "20230510"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02605",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-125, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02605",
|
||
"Impact": "High",
|
||
"Public": "20230413"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02624",
|
||
"CVSS": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02624",
|
||
"Impact": "Low",
|
||
"Public": "20230130"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02625",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02625",
|
||
"Impact": "High",
|
||
"Public": "20230503"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02740",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02740",
|
||
"Impact": "Critical",
|
||
"Public": "20230501"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02742",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02742",
|
||
"Impact": "High",
|
||
"Public": "20230427"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02744",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02744",
|
||
"Impact": "High",
|
||
"Public": "20230427"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02746",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02746",
|
||
"Impact": "High",
|
||
"Public": "20230503"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02747",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-667",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02747",
|
||
"Impact": "High",
|
||
"Public": "20230427"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02749",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02749",
|
||
"Impact": "High",
|
||
"Public": "20230427"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02750",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401, CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02750",
|
||
"Impact": "High",
|
||
"Public": "20230427"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02995",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02995",
|
||
"Impact": "High",
|
||
"Public": "20221114"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03172",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03172",
|
||
"Impact": "High",
|
||
"Public": "20230323"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03444",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03444",
|
||
"Impact": "High",
|
||
"Public": "20230410"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03501",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03501",
|
||
"Impact": "High",
|
||
"Public": "20230323"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03502",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03502",
|
||
"Impact": "High",
|
||
"Public": "20230410"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03584",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03584",
|
||
"Impact": "High",
|
||
"Public": "20230707"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03677",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03677",
|
||
"Impact": "High",
|
||
"Public": "20230608"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03778",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03778",
|
||
"Impact": "High",
|
||
"Public": "20230704"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03785",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-682, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03785",
|
||
"Impact": "High",
|
||
"Public": "20230419"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03947",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03947",
|
||
"Impact": "High",
|
||
"Public": "20230717"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03951",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03951",
|
||
"Impact": "Critical",
|
||
"Public": "20230616"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03952",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03952",
|
||
"Impact": "Critical",
|
||
"Public": "20230602"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03953",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03953",
|
||
"Impact": "Critical",
|
||
"Public": "20230602"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03954",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-193, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03954",
|
||
"Impact": "Critical",
|
||
"Public": "20230516"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03955",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03955",
|
||
"Impact": "Critical",
|
||
"Public": "20230516"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03956",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-191",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03956",
|
||
"Impact": "Critical",
|
||
"Public": "20230602"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03957",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03957",
|
||
"Impact": "Low",
|
||
"Public": "20230516"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-03961",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-03961",
|
||
"Impact": "High",
|
||
"Public": "20230620"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04466",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04466",
|
||
"Impact": "High",
|
||
"Public": "20230720"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-04653",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416, CWE-911",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-04653",
|
||
"Impact": "High",
|
||
"Public": "20230726"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-05369",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-05369",
|
||
"Impact": "High",
|
||
"Public": "20230731"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-05389",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416, CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-05389",
|
||
"Impact": "High",
|
||
"Public": "20230523"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-05390",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-05390",
|
||
"Impact": "High",
|
||
"Public": "20230731"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-05391",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-05391",
|
||
"Impact": "High",
|
||
"Public": "20230731"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-08958",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-08958",
|
||
"Impact": "High",
|
||
"Public": "20231218"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01186",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01186",
|
||
"Impact": "High",
|
||
"Public": "20240117"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01187",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01187",
|
||
"Impact": "High",
|
||
"Public": "20240124"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01590",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-19, CWE-119, CWE-617",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01590",
|
||
"Impact": "High",
|
||
"Public": "20231128"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01670",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-120, CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01670",
|
||
"Impact": "Critical",
|
||
"Public": "20230829"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01676",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-119, CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01676",
|
||
"Impact": "High",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01838",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01838",
|
||
"Impact": "High",
|
||
"Public": "20231123"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01844",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01844",
|
||
"Impact": "Low",
|
||
"Public": "20240104"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01848",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01848",
|
||
"Impact": "Low",
|
||
"Public": "20231218"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01851",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01851",
|
||
"Impact": "High",
|
||
"Public": "20231204"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01852",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125, CWE-129",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01852",
|
||
"Impact": "High",
|
||
"Public": "20231201"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01858",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01858",
|
||
"Impact": "Low",
|
||
"Public": "20231222"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01866",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01866",
|
||
"Impact": "High",
|
||
"Public": "20240116"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01867",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01867",
|
||
"Impact": "Low",
|
||
"Public": "20240104"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01924",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119, CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01924",
|
||
"Impact": "High",
|
||
"Public": "20240117"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2022-2196",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-1188",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196",
|
||
"Impact": "High",
|
||
"Public": "20230109"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-3424",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3424",
|
||
"Impact": "High",
|
||
"Public": "20230306"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38457",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38457",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-40133",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40133",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4379",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4379",
|
||
"Impact": "High",
|
||
"Public": "20230110"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-47929",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929",
|
||
"Impact": "Low",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-48423",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-48423",
|
||
"Impact": "High",
|
||
"Public": "20230319"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-48424",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-48424",
|
||
"Impact": "High",
|
||
"Public": "20230319"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-48502",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-48502",
|
||
"Impact": "High",
|
||
"Public": "20230531"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0045",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-610",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0045",
|
||
"Impact": "High",
|
||
"Public": "20230425"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0179",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0179",
|
||
"Impact": "High",
|
||
"Public": "20230327"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0210",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0210",
|
||
"Impact": "High",
|
||
"Public": "20230327"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0266",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0266",
|
||
"Impact": "High",
|
||
"Public": "20230130"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0386",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0386",
|
||
"Impact": "High",
|
||
"Public": "20230322"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0458",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0458",
|
||
"Impact": "Low",
|
||
"Public": "20230426"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1077",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1077",
|
||
"Impact": "High",
|
||
"Public": "20230327"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1078",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1078",
|
||
"Impact": "High",
|
||
"Public": "20230327"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1118",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1118",
|
||
"Impact": "High",
|
||
"Public": "20230302"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1281",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281",
|
||
"Impact": "High",
|
||
"Public": "20230322"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1380",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1380",
|
||
"Impact": "High",
|
||
"Public": "20230327"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1583",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1583",
|
||
"Impact": "Low",
|
||
"Public": "20230324"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1611",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1611",
|
||
"Impact": "Low",
|
||
"Public": "20230403"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1652",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1652",
|
||
"Impact": "High",
|
||
"Public": "20230329"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1670",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1670",
|
||
"Impact": "High",
|
||
"Public": "20230330"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1829",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1829",
|
||
"Impact": "High",
|
||
"Public": "20230412"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1989",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989",
|
||
"Impact": "High",
|
||
"Public": "20230411"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2156",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2156",
|
||
"Impact": "High",
|
||
"Public": "20230509"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2163",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-682",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2163",
|
||
"Impact": "High",
|
||
"Public": "20230920"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2235",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2235",
|
||
"Impact": "High",
|
||
"Public": "20230501"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-22997",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22997",
|
||
"Impact": "Low",
|
||
"Public": "20230228"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23454",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454",
|
||
"Impact": "Low",
|
||
"Public": "20230112"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23455",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23455",
|
||
"Impact": "Low",
|
||
"Public": "20230112"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-23559",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23559",
|
||
"Impact": "High",
|
||
"Public": "20230113"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-25012",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25012",
|
||
"Impact": "Low",
|
||
"Public": "20230202"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-26242",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26242",
|
||
"Impact": "High",
|
||
"Public": "20230221"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-26544",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26544",
|
||
"Impact": "High",
|
||
"Public": "20230225"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-26545",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26545",
|
||
"Impact": "Low",
|
||
"Public": "20230225"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-26606",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26606",
|
||
"Impact": "High",
|
||
"Public": "20230226"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-28466",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28466",
|
||
"Impact": "High",
|
||
"Public": "20230316"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-31248",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-31248",
|
||
"Impact": "High",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3141",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3141",
|
||
"Impact": "High",
|
||
"Public": "20230609"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-31436",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-31436",
|
||
"Impact": "High",
|
||
"Public": "20230428"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32233",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233",
|
||
"Impact": "High",
|
||
"Public": "20230508"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32247",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32247",
|
||
"Impact": "High",
|
||
"Public": "20230724"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32248",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32248",
|
||
"Impact": "High",
|
||
"Public": "20230724"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32250",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32250",
|
||
"Impact": "High",
|
||
"Public": "20230710"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32252",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32252",
|
||
"Impact": "High",
|
||
"Public": "20230724"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32254",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32254",
|
||
"Impact": "High",
|
||
"Public": "20230710"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32257",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32257",
|
||
"Impact": "High",
|
||
"Public": "20230724"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32258",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32258",
|
||
"Impact": "High",
|
||
"Public": "20230724"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-32269",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32269",
|
||
"Impact": "Low",
|
||
"Public": "20230505"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3269",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3269",
|
||
"Impact": "High",
|
||
"Public": "20230711"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3390",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3390",
|
||
"Impact": "High",
|
||
"Public": "20230628"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-35001",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35001",
|
||
"Impact": "High",
|
||
"Public": "20230705"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-35826",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35826",
|
||
"Impact": "High",
|
||
"Public": "20230618"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-35828",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35828",
|
||
"Impact": "High",
|
||
"Public": "20230618"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-35829",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35829",
|
||
"Impact": "High",
|
||
"Public": "20230618"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3610",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3610",
|
||
"Impact": "High",
|
||
"Public": "20230721"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-38426",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38426",
|
||
"Impact": "Critical",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-38427",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38427",
|
||
"Impact": "Critical",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-38428",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38428",
|
||
"Impact": "Critical",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-38429",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-193",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38429",
|
||
"Impact": "Critical",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-38430",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38430",
|
||
"Impact": "Critical",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-38431",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38431",
|
||
"Impact": "Critical",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-38432",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38432",
|
||
"Impact": "Critical",
|
||
"Public": "20230718"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-4004",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4004",
|
||
"Impact": "High",
|
||
"Public": "20230731"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-4015",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4015",
|
||
"Impact": "High",
|
||
"Public": "20230906"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-4206",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4206",
|
||
"Impact": "High",
|
||
"Public": "20230906"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-4207",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4207",
|
||
"Impact": "High",
|
||
"Public": "20230906"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-4208",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4208",
|
||
"Impact": "High",
|
||
"Public": "20230906"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-4622",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4622",
|
||
"Impact": "High",
|
||
"Public": "20230906"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52438",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52438",
|
||
"Impact": "High",
|
||
"Public": "20240220"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52439",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52439",
|
||
"Impact": "High",
|
||
"Public": "20240220"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52440",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52440",
|
||
"Impact": "High",
|
||
"Public": "20240221"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52441",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52441",
|
||
"Impact": "High",
|
||
"Public": "20240221"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52443",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52443",
|
||
"Impact": "Low",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52444",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52444",
|
||
"Impact": "High",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52445",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52445",
|
||
"Impact": "High",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52447",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52447",
|
||
"Impact": "High",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52448",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52448",
|
||
"Impact": "Low",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52449",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52449",
|
||
"Impact": "Low",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-52451",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-52451",
|
||
"Impact": "High",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-6817",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-6817",
|
||
"Impact": "High",
|
||
"Public": "20231218"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-1085",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1085",
|
||
"Impact": "High",
|
||
"Public": "20240131"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-1086",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-1086",
|
||
"Impact": "High",
|
||
"Public": "20240131"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-26588",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-26588",
|
||
"Impact": "High",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-26589",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-26589",
|
||
"Impact": "High",
|
||
"Public": "20240222"
|
||
},
|
||
{
|
||
"ID": "CVE-2024-26591",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-26591",
|
||
"Impact": "Low",
|
||
"Public": "20240222"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:10",
|
||
"cpe:/o:alt:workstation:10",
|
||
"cpe:/o:alt:server:10",
|
||
"cpe:/o:alt:server-v:10",
|
||
"cpe:/o:alt:education:10",
|
||
"cpe:/o:alt:slinux:10",
|
||
"cpe:/o:alt:starterkit:p10",
|
||
"cpe:/o:alt:kworkstation:10.1",
|
||
"cpe:/o:alt:workstation:10.1",
|
||
"cpe:/o:alt:server:10.1",
|
||
"cpe:/o:alt:server-v:10.1",
|
||
"cpe:/o:alt:education:10.1",
|
||
"cpe:/o:alt:slinux:10.1",
|
||
"cpe:/o:alt:starterkit:10.1",
|
||
"cpe:/o:alt:kworkstation:10.2",
|
||
"cpe:/o:alt:workstation:10.2",
|
||
"cpe:/o:alt:server:10.2",
|
||
"cpe:/o:alt:server-v:10.2",
|
||
"cpe:/o:alt:education:10.2",
|
||
"cpe:/o:alt:slinux:10.2",
|
||
"cpe:/o:alt:starterkit:10.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20244843001",
|
||
"Comment": "kernel-headers-modules-rpi-un is earlier than 1:6.1.77-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20244843002",
|
||
"Comment": "kernel-headers-rpi-un is earlier than 1:6.1.77-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20244843003",
|
||
"Comment": "kernel-image-rpi-un is earlier than 1:6.1.77-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |