{ "Definition": [ { "ID": "oval:org.altlinux.errata:def:20171521", "Version": "oval:org.altlinux.errata:def:20171521", "Class": "patch", "Metadata": { "Title": "ALT-PU-2017-1521: package `qemu` update to version 2.9.0-alt1", "AffectedList": [ { "Family": "unix", "Platforms": [ "ALT Linux branch c9f2" ], "Products": [ "ALT SPWorkstation", "ALT SPServer" ] } ], "References": [ { "RefID": "ALT-PU-2017-1521", "RefURL": "https://errata.altlinux.org/ALT-PU-2017-1521", "Source": "ALTPU" }, { "RefID": "BDU:2017-00072", "RefURL": "https://bdu.fstec.ru/vul/2017-00072", "Source": "BDU" }, { "RefID": "BDU:2017-00074", "RefURL": "https://bdu.fstec.ru/vul/2017-00074", "Source": "BDU" }, { "RefID": "BDU:2017-00646", "RefURL": "https://bdu.fstec.ru/vul/2017-00646", "Source": "BDU" }, { "RefID": "BDU:2017-00647", "RefURL": "https://bdu.fstec.ru/vul/2017-00647", "Source": "BDU" }, { "RefID": "BDU:2017-00648", "RefURL": "https://bdu.fstec.ru/vul/2017-00648", "Source": "BDU" }, { "RefID": "BDU:2017-00649", "RefURL": "https://bdu.fstec.ru/vul/2017-00649", "Source": "BDU" }, { "RefID": "BDU:2017-00650", "RefURL": "https://bdu.fstec.ru/vul/2017-00650", "Source": "BDU" }, { "RefID": "BDU:2017-00651", "RefURL": "https://bdu.fstec.ru/vul/2017-00651", "Source": "BDU" }, { "RefID": "BDU:2017-00652", "RefURL": "https://bdu.fstec.ru/vul/2017-00652", "Source": "BDU" }, { "RefID": "BDU:2017-00653", "RefURL": "https://bdu.fstec.ru/vul/2017-00653", "Source": "BDU" }, { "RefID": "BDU:2017-00654", "RefURL": "https://bdu.fstec.ru/vul/2017-00654", "Source": "BDU" }, { "RefID": "BDU:2017-00764", "RefURL": "https://bdu.fstec.ru/vul/2017-00764", "Source": "BDU" }, { "RefID": "BDU:2017-00772", "RefURL": "https://bdu.fstec.ru/vul/2017-00772", "Source": "BDU" }, { "RefID": "BDU:2017-00773", "RefURL": "https://bdu.fstec.ru/vul/2017-00773", "Source": "BDU" }, { "RefID": "BDU:2017-01462", "RefURL": "https://bdu.fstec.ru/vul/2017-01462", "Source": "BDU" }, { "RefID": "BDU:2021-03332", "RefURL": "https://bdu.fstec.ru/vul/2021-03332", "Source": "BDU" }, { "RefID": "BDU:2021-03350", "RefURL": "https://bdu.fstec.ru/vul/2021-03350", "Source": "BDU" }, { "RefID": "BDU:2021-03352", "RefURL": "https://bdu.fstec.ru/vul/2021-03352", "Source": "BDU" }, { "RefID": "CVE-2016-10028", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10028", "Source": "CVE" }, { "RefID": "CVE-2016-10155", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10155", "Source": "CVE" }, { "RefID": "CVE-2016-7907", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7907", "Source": "CVE" }, { "RefID": "CVE-2016-8667", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8667", "Source": "CVE" }, { "RefID": "CVE-2016-9602", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9602", "Source": "CVE" }, { "RefID": "CVE-2016-9603", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9603", "Source": "CVE" }, { "RefID": "CVE-2016-9908", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9908", "Source": "CVE" }, { "RefID": "CVE-2016-9912", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9912", "Source": "CVE" }, { "RefID": "CVE-2017-18030", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18030", "Source": "CVE" }, { "RefID": "CVE-2017-2615", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2615", "Source": "CVE" }, { "RefID": "CVE-2017-2630", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2630", "Source": "CVE" }, { "RefID": "CVE-2017-5525", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5525", "Source": "CVE" }, { "RefID": "CVE-2017-5526", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5526", "Source": "CVE" }, { "RefID": "CVE-2017-5552", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5552", "Source": "CVE" }, { "RefID": "CVE-2017-5578", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5578", "Source": "CVE" }, { "RefID": "CVE-2017-5579", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5579", "Source": "CVE" }, { "RefID": "CVE-2017-5667", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5667", "Source": "CVE" }, { "RefID": "CVE-2017-5856", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5856", "Source": "CVE" }, { "RefID": "CVE-2017-5857", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5857", "Source": "CVE" }, { "RefID": "CVE-2017-5898", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5898", "Source": "CVE" }, { "RefID": "CVE-2017-5931", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5931", "Source": "CVE" }, { "RefID": "CVE-2017-5973", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5973", "Source": "CVE" }, { "RefID": "CVE-2017-5987", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5987", "Source": "CVE" }, { "RefID": "CVE-2017-6058", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6058", "Source": "CVE" }, { "RefID": "CVE-2017-6505", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6505", "Source": "CVE" }, { "RefID": "CVE-2017-7377", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7377", "Source": "CVE" }, { "RefID": "CVE-2017-7471", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7471", "Source": "CVE" }, { "RefID": "CVE-2017-7718", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7718", "Source": "CVE" }, { "RefID": "CVE-2017-8086", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8086", "Source": "CVE" }, { "RefID": "CVE-2017-8284", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8284", "Source": "CVE" }, { "RefID": "CVE-2017-9060", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9060", "Source": "CVE" }, { "RefID": "CVE-2017-9310", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9310", "Source": "CVE" }, { "RefID": "CVE-2017-9330", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9330", "Source": "CVE" }, { "RefID": "CVE-2017-9373", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9373", "Source": "CVE" }, { "RefID": "CVE-2017-9374", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9374", "Source": "CVE" }, { "RefID": "CVE-2017-9375", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9375", "Source": "CVE" }, { "RefID": "CVE-2018-17962", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17962", "Source": "CVE" } ], "Description": "This update upgrades qemu to version 2.9.0-alt1. \nSecurity Fix(es):\n\n * BDU:2017-00072: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность\n\n * BDU:2017-00074: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2017-00646: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00647: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00648: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00649: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00650: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00651: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00652: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00653: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00654: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2017-00764: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00772: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00773: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-01462: Уязвимость компонента hw/virtio/virtio-crypto.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-03332: Уязвимость функции virgl_cmd_get_capset компонента hw/display/virtio-gpu-3d.c эмулятора аппаратного обеспечения QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03350: Уязвимость функции virtio_gpu_set_scanout компонента hw/display/virtio-gpu.c эмулятора аппаратного обеспечения QEMU, связанная с недостатком механизма освобождения памяти перед удалением последней ссылки, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03352: Уязвимость функции disas_insn компонента target/i386/translate.c эмулятора аппаратного обеспечения QEMU, связанная с недостатком механизма управления генерацией кода, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2016-10028: The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0.\n\n * CVE-2016-10155: Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.\n\n * CVE-2016-7907: The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.\n\n * CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.\n\n * CVE-2016-9602: Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.\n\n * CVE-2016-9603: A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.\n\n * CVE-2016-9908: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes.\n\n * CVE-2016-9912: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.\n\n * CVE-2017-18030: The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.\n\n * CVE-2017-2615: Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.\n\n * CVE-2017-2630: A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.\n\n * CVE-2017-5525: Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.\n\n * CVE-2017-5526: Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.\n\n * CVE-2017-5552: Memory leak in the virgl_resource_attach_backing function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.\n\n * CVE-2017-5578: Memory leak in the virtio_gpu_resource_attach_backing function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.\n\n * CVE-2017-5579: Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.\n\n * CVE-2017-5667: The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.\n\n * CVE-2017-5856: Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.\n\n * CVE-2017-5857: Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.\n\n * CVE-2017-5898: Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.\n\n * CVE-2017-5931: Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code on the host via a crafted virtio-crypto request, which triggers a heap-based buffer overflow.\n\n * CVE-2017-5973: The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.\n\n * CVE-2017-5987: The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local OS guest privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors involving the transfer mode register during multi block transfer.\n\n * CVE-2017-6058: Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.\n\n * CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.\n\n * CVE-2017-7377: The (1) v9fs_create and (2) v9fs_lcreate functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS privileged users to cause a denial of service (file descriptor or memory consumption) via vectors related to an already in-use fid.\n\n * CVE-2017-7471: Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.\n\n * CVE-2017-7718: hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions.\n\n * CVE-2017-8086: Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable.\n\n * CVE-2017-8284: The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: the vendor has stated \"this bug does not violate any security guarantees QEMU makes.\n\n * CVE-2017-9060: Memory leak in the virtio_gpu_set_scanout function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (memory consumption) via a large number of \"VIRTIO_GPU_CMD_SET_SCANOUT:\" commands.\n\n * CVE-2017-9310: QEMU (aka Quick Emulator), when built with the e1000e NIC emulation support, allows local guest OS privileged users to cause a denial of service (infinite loop) via vectors related to setting the initial receive / transmit descriptor head (TDH/RDH) outside the allocated descriptor buffer.\n\n * CVE-2017-9330: QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.\n\n * CVE-2017-9373: Memory leak in QEMU (aka Quick Emulator), when built with IDE AHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the AHCI device.\n\n * CVE-2017-9374: Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.\n\n * CVE-2017-9375: QEMU (aka Quick Emulator), when built with USB xHCI controller emulator support, allows local guest OS privileged users to cause a denial of service (infinite recursive call) via vectors involving control transfer descriptors sequencing.\n\n * CVE-2018-17962: Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.", "Advisory": { "From": "errata.altlinux.org", "Severity": "Critical", "Rights": "Copyright 2024 BaseALT Ltd.", "Issued": { "Date": "2017-04-25" }, "Updated": { "Date": "2017-04-25" }, "BDUs": [ { "ID": "BDU:2017-00072", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CWE": "CWE-400", "Href": "https://bdu.fstec.ru/vul/2017-00072", "Impact": "Low", "Public": "20161224" }, { "ID": "BDU:2017-00074", "CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "CWE": "CWE-200", "Href": "https://bdu.fstec.ru/vul/2017-00074", "Impact": "Low", "Public": "20161224" }, { "ID": "BDU:2017-00646", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00646", "Impact": "Low", "Public": "20170315" }, { "ID": "BDU:2017-00647", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00647", "Impact": "Low", "Public": "20170315" }, { "ID": "BDU:2017-00648", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00648", "Impact": "Low", "Public": "20170315" }, { "ID": "BDU:2017-00649", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00649", "Impact": "Low", "Public": "20170315" }, { "ID": "BDU:2017-00650", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00650", "Impact": "Low", "Public": "20170315" }, { "ID": "BDU:2017-00651", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2017-00651", "Impact": "Low", "Public": "20170315" }, { "ID": "BDU:2017-00652", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00652", "Impact": "Low", "Public": "20170316" }, { "ID": "BDU:2017-00653", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00653", "Impact": "Low", "Public": "20170316" }, { "ID": "BDU:2017-00654", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00654", "Impact": "Low", "Public": "20170316" }, { "ID": "BDU:2017-00764", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00764", "Impact": "Low", "Public": "20170315" }, { "ID": "BDU:2017-00772", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "CWE": "CWE-119", "Href": "https://bdu.fstec.ru/vul/2017-00772", "Impact": "Low", "Public": "20170320" }, { "ID": "BDU:2017-00773", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CWE": "CWE-399", "Href": "https://bdu.fstec.ru/vul/2017-00773", "Impact": "Low", "Public": "20170320" }, { "ID": "BDU:2017-01462", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CWE": "CWE-190", "Href": "https://bdu.fstec.ru/vul/2017-01462", "Impact": "High", "Public": "20170327" }, { "ID": "BDU:2021-03332", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://bdu.fstec.ru/vul/2021-03332", "Impact": "Low", "Public": "20161214" }, { "ID": "BDU:2021-03350", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://bdu.fstec.ru/vul/2021-03350", "Impact": "Low", "Public": "20170122" }, { "ID": "BDU:2021-03352", "CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-94", "Href": "https://bdu.fstec.ru/vul/2021-03352", "Impact": "High", "Public": "20170210" } ], "CVEs": [ { "ID": "CVE-2016-10028", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10028", "Impact": "Low", "Public": "20170227" }, { "ID": "CVE-2016-10155", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10155", "Impact": "Low", "Public": "20170315" }, { "ID": "CVE-2016-7907", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7907", "Impact": "Low", "Public": "20161005" }, { "ID": "CVE-2016-8667", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-369", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8667", "Impact": "Low", "Public": "20161104" }, { "ID": "CVE-2016-9602", "CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-59", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9602", "Impact": "High", "Public": "20180426" }, { "ID": "CVE-2016-9603", "CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "CWE": "CWE-119", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9603", "Impact": "Critical", "Public": "20180727" }, { "ID": "CVE-2016-9908", "CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "CWE": "CWE-200", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9908", "Impact": "Low", "Public": "20161223" }, { "ID": "CVE-2016-9912", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-772", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9912", "Impact": "Low", "Public": "20161223" }, { "ID": "CVE-2017-18030", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18030", "Impact": "Low", "Public": "20180123" }, { "ID": "CVE-2017-2615", "CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "CVSS3": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2615", "Impact": "Critical", "Public": "20180703" }, { "ID": "CVE-2017-2630", "CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-121", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2630", "Impact": "High", "Public": "20180727" }, { "ID": "CVE-2017-5525", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5525", "Impact": "Low", "Public": "20170315" }, { "ID": "CVE-2017-5526", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5526", "Impact": "Low", "Public": "20170315" }, { "ID": "CVE-2017-5552", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5552", "Impact": "Low", "Public": "20170315" }, { "ID": "CVE-2017-5578", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5578", "Impact": "Low", "Public": "20170315" }, { "ID": "CVE-2017-5579", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5579", "Impact": "Low", "Public": "20170315" }, { "ID": "CVE-2017-5667", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5667", "Impact": "Low", "Public": "20170316" }, { "ID": "CVE-2017-5856", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5856", "Impact": "Low", "Public": "20170316" }, { "ID": "CVE-2017-5857", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5857", "Impact": "Low", "Public": "20170316" }, { "ID": "CVE-2017-5898", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-190", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5898", "Impact": "Low", "Public": "20170315" }, { "ID": "CVE-2017-5931", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "CWE": "CWE-190", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5931", "Impact": "High", "Public": "20170327" }, { "ID": "CVE-2017-5973", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-835", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5973", "Impact": "Low", "Public": "20170327" }, { "ID": "CVE-2017-5987", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-835", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5987", "Impact": "Low", "Public": "20170320" }, { "ID": "CVE-2017-6058", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-120", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6058", "Impact": "High", "Public": "20170320" }, { "ID": "CVE-2017-6505", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-835", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6505", "Impact": "Low", "Public": "20170315" }, { "ID": "CVE-2017-7377", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-772", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7377", "Impact": "Low", "Public": "20170410" }, { "ID": "CVE-2017-7471", "CVSS": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "CWE": "CWE-732", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7471", "Impact": "Critical", "Public": "20180709" }, { "ID": "CVE-2017-7718", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7718", "Impact": "Low", "Public": "20170420" }, { "ID": "CVE-2017-8086", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-772", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8086", "Impact": "Low", "Public": "20170502" }, { "ID": "CVE-2017-8284", "CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-94", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8284", "Impact": "High", "Public": "20170426" }, { "ID": "CVE-2017-9060", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9060", "Impact": "Low", "Public": "20170601" }, { "ID": "CVE-2017-9310", "CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "CWE-835", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9310", "Impact": "Low", "Public": "20170608" }, { "ID": "CVE-2017-9330", "CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "CWE": "NVD-CWE-noinfo", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9330", "Impact": "Low", "Public": "20170608" }, { "ID": "CVE-2017-9373", "CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9373", "Impact": "Low", "Public": "20170616" }, { "ID": "CVE-2017-9374", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9374", "Impact": "Low", "Public": "20170616" }, { "ID": "CVE-2017-9375", "CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-835", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9375", "Impact": "Low", "Public": "20170616" }, { "ID": "CVE-2018-17962", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-119", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17962", "Impact": "High", "Public": "20181009" } ], "AffectedCPEs": { "CPEs": [ "cpe:/o:alt:spworkstation:8.4", "cpe:/o:alt:spserver:8.4" ] } } }, "Criteria": { "Operator": "AND", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:3001", "Comment": "ALT Linux must be installed" } ], "Criterias": [ { "Operator": "OR", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:20171521001", "Comment": "ivshmem-tools is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521002", "Comment": "qemu is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521003", "Comment": "qemu-aux is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521004", "Comment": "qemu-common is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521005", "Comment": "qemu-doc is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521006", "Comment": "qemu-guest-agent is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521007", "Comment": "qemu-img is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521008", "Comment": "qemu-system is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521009", "Comment": "qemu-user is earlier than 0:2.9.0-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171521010", "Comment": "qemu-user-binfmt_misc is earlier than 0:2.9.0-alt1" } ] } ] } } ] }