Lucene search

K
rosalinuxROSA LABROSA-SA-2023-2189
HistoryJul 11, 2023 - 2:30 p.m.

Advisory ROSA-SA-2023-2189

2023-07-1114:30:55
ROSA LAB
abf.rosalinux.ru
21

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.9%

Software: kernel-ml 5.15.117
OS: rosa-server79

package_evr_string: kernel-ml-5.15.117-1.res7

CVE-ID: CVE-2023-31085
BDU-ID: 2023-02516
CVE-Crit: MEDIUM
CVE-DESC.: A vulnerability in the mtd_div_by_eb() function in the include/linux/mtd/mtd/mtd.h module of the Linux operating system kernel is related to division by zero. Exploitation of the vulnerability could allow an attacker to cause a denial of service or possibly have other effects
CVE-STATUS: Not Current
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2023-2124
BDU-ID: 2023-02529
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the XFS file system of the Linux operating system kernel is related to insufficient metadata control during mount (mount) of images with the XFS file system in the xlog_recover_buf_commit_pass2() function in the fs/xfs/xfs_buf_item_recover.c module. Exploitation of the vulnerability could allow an attacker to cause a denial of service or elevate their privileges
CVE-STATUS: Not Current
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2022-41674
BDU-ID: 2022-06272
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the cfg80211_update_notlisted_nontrans function of the net/wireless/scan.c file of the Linux operating systems kernel is related to a buffer overflow. Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary code
CVE-STATUS: Unpatched
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2022-42720
BDU-ID: 2022-06273
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the link counting functionality of the BSS (Basic Service Set) mode of the Linux kernel operating systems is related to the ability to use memory after it has been freed. Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary code
CVE-STATUS: Unpatched
CVE-REV: Execute the command yum update kernel-ml

CVE-ID: CVE-2022-42719
BDU-ID: 2022-06274
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the Linux operating systems kernel is related to the ability to use post-release memory in MBSSID parsing code. Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary code
CVE-STATUS: Unpatched
CVE-REV: Execute the command yum update kernel-ml

CVE-ID: CVE-2022-2602
BDU-ID: 2022-06407
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the io_uring asynchronous I/O interface of the Linux operating system kernel is related to the ability to use memory after it has been freed. Exploitation of the vulnerability could allow an attacker to escalate his privileges
CVE-STATUS: Unpatched
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2022-43995
BDU-ID: 2022-06664
CVE-Crit: MEDIUM
CVE-DESC.: A vulnerability in the implementation of the crypt() function of the Sudo system administration program is related to the ability to read outside the buffer in memory when processing the plugins/sudoers/auth/passwd.c file. Exploitation of the vulnerability could allow an attacker to cause a denial of service
CVE-STATUS: Not Current
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2022-42896
BDU-ID: 2022-07074
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the l2cap_connect and l2cap_le_connect_req (net/bluetooth/l2cap_core.c) functions of the Linux operating systems kernel is related to the ability to use memory after release. Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary code
CVE-STATUS: Unpatched
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2023-1998
BDU-ID: 2023-02115
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the prctl function of the Linux operating system kernel is caused by incorrect implementation of optimizations. Exploitation of the vulnerability could allow a remote attacker to gain access to protected information using the PR_SET_SPECULATION_CTRL parameter.
CVE-STATUS: Not Current
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2023-2156
BDU-ID: 2023-02580
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the IPv6 RPL protocol implementation of the Linux operating system kernel is related to incorrect packet header size calculation in the ipv6_rpl_segdata_pos() function in the net/ipv6/rpl.c module. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service
CVE-STATUS: Not Current
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2022-4378
BDU-ID: 2022-07336
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the __do_proc_dointvec function of the Linux operating system kernel is related to the use of the function with inconsistent implementations. Exploitation of the vulnerability could allow an attacker to cause a denial of service or escalate their privileges
CVE-STATUS: Unpatched
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2022-47939
BDU-ID: 2022-07401
CVE-Crit: CRITICAL.
CVE-DESC.: A vulnerability in the smb2_tree_disconnect function (fs/ksmbd/smb2pdu.c) of the ksmbd module of the Linux operating system kernel is related to post-release memory usage. Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary code
CVE-STATUS: Unpatched
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2022-47940
BDU-ID: 2022-07480
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the smb2_write (fs/ksmbd/smb2pdu.c) function of the ksmbd module of the Linux operating system kernel is related to the ability to read beyond buffer boundaries in memory. Exploitation of the vulnerability could allow an attacker acting remotely to disclose protected information
CVE-STATUS: Unpatched
CVE-REV: Execute the yum update kernel-ml command

CVE-ID: CVE-2022-4378
BDU-ID: 2022-07336
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the __do_proc_dointvec function of the Linux operating system kernel is related to the use of the function with inconsistent implementations. Exploitation of the vulnerability could allow an attacker to cause a denial of service or escalate their privileges
CVE-STATUS: Unpatched
CVE-REV: Execute the yum update kernel-ml command

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.9%