2024-06-28 13:17:52 +00:00

298 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221051",
"Version": "oval:org.altlinux.errata:def:20221051",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1051: package `kernel-image-un-def` update to version 5.15.14-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1051",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1051",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00026",
"RefURL": "https://bdu.fstec.ru/vul/2022-00026",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01121",
"RefURL": "https://bdu.fstec.ru/vul/2022-01121",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02367",
"RefURL": "https://bdu.fstec.ru/vul/2022-02367",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01216",
"RefURL": "https://bdu.fstec.ru/vul/2023-01216",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01771",
"RefURL": "https://bdu.fstec.ru/vul/2023-01771",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01797",
"RefURL": "https://bdu.fstec.ru/vul/2023-01797",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4197",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"Source": "CVE"
},
{
"RefID": "CVE-2021-44733",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"Source": "CVE"
},
{
"RefID": "CVE-2021-45469",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45469",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4744",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4744",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23006",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23006",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 5.15.14-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00026: Уязвимость реализации системного вызова TEE_IOC_OPEN_SESSION или TEE_IOC_INVOKE ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-01121: Уязвимость функции __f2fs_setxattr ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-02367: Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-01216: Уязвимость функции dr_domain_init_resources() в модуле drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01771: Уязвимость функции ib_copy_ah_attr_to_user() менеджера соединений RDMA ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-01797: Уязвимость функции tun_free_netdev() виртуальных сетевых драйверов TUN/TAP ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * CVE-2021-3923: A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.\n\n * CVE-2021-4197: An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.\n\n * CVE-2021-44733: A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.\n\n * CVE-2021-45469: In __f2fs_setxattr in fs/f2fs/xattr.c in the Linux kernel through 5.15.11, there is an out-of-bounds memory access when an inode has an invalid last xattr entry.\n\n * CVE-2022-4744: A double-free flaw was found in the Linux kernels TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2023-23006: In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-01-14"
},
"Updated": {
"Date": "2022-01-14"
},
"BDUs": [
{
"ID": "BDU:2022-00026",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2022-00026",
"Impact": "High",
"Public": "20211216"
},
{
"ID": "BDU:2022-01121",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-01121",
"Impact": "High",
"Public": "20211222"
},
{
"ID": "BDU:2022-02367",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://bdu.fstec.ru/vul/2022-02367",
"Impact": "High",
"Public": "20220106"
},
{
"ID": "BDU:2023-01216",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-253",
"Href": "https://bdu.fstec.ru/vul/2023-01216",
"Impact": "Low",
"Public": "20211222"
},
{
"ID": "BDU:2023-01771",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2023-01771",
"Impact": "Low",
"Public": "20211103"
},
{
"ID": "BDU:2023-01797",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415, CWE-460, CWE-824",
"Href": "https://bdu.fstec.ru/vul/2023-01797",
"Impact": "High",
"Public": "20211217"
}
],
"CVEs": [
{
"ID": "CVE-2021-3923",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"Impact": "Low",
"Public": "20230327"
},
{
"ID": "CVE-2021-4197",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"Impact": "High",
"Public": "20220323"
},
{
"ID": "CVE-2021-44733",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"Impact": "High",
"Public": "20211222"
},
{
"ID": "CVE-2021-45469",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45469",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2022-4744",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4744",
"Impact": "High",
"Public": "20230330"
},
{
"ID": "CVE-2023-23006",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23006",
"Impact": "Low",
"Public": "20230301"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221051001",
"Comment": "kernel-doc-un is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051003",
"Comment": "kernel-headers-un-def is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051004",
"Comment": "kernel-image-domU-un-def is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051005",
"Comment": "kernel-image-un-def is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051006",
"Comment": "kernel-image-un-def-checkinstall is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051007",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051008",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.15.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221051010",
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.15.14-alt1"
}
]
}
]
}
}
]
}