{ "Definition": [ { "ID": "oval:org.altlinux.errata:def:20171299", "Version": "oval:org.altlinux.errata:def:20171299", "Class": "patch", "Metadata": { "Title": "ALT-PU-2017-1299: package `kernel-image-un-def` update to version 4.10.3-alt1", "AffectedList": [ { "Family": "unix", "Platforms": [ "ALT Linux branch p11" ], "Products": [ "ALT Container" ] } ], "References": [ { "RefID": "ALT-PU-2017-1299", "RefURL": "https://errata.altlinux.org/ALT-PU-2017-1299", "Source": "ALTPU" }, { "RefID": "BDU:2017-01086", "RefURL": "https://bdu.fstec.ru/vul/2017-01086", "Source": "BDU" }, { "RefID": "BDU:2017-01091", "RefURL": "https://bdu.fstec.ru/vul/2017-01091", "Source": "BDU" }, { "RefID": "BDU:2018-00574", "RefURL": "https://bdu.fstec.ru/vul/2018-00574", "Source": "BDU" }, { "RefID": "BDU:2018-00575", "RefURL": "https://bdu.fstec.ru/vul/2018-00575", "Source": "BDU" }, { "RefID": "BDU:2018-00576", "RefURL": "https://bdu.fstec.ru/vul/2018-00576", "Source": "BDU" }, { "RefID": "BDU:2019-00818", "RefURL": "https://bdu.fstec.ru/vul/2019-00818", "Source": "BDU" }, { "RefID": "BDU:2019-01060", "RefURL": "https://bdu.fstec.ru/vul/2019-01060", "Source": "BDU" }, { "RefID": "BDU:2019-02196", "RefURL": "https://bdu.fstec.ru/vul/2019-02196", "Source": "BDU" }, { "RefID": "BDU:2019-04515", "RefURL": "https://bdu.fstec.ru/vul/2019-04515", "Source": "BDU" }, { "RefID": "BDU:2019-04676", "RefURL": "https://bdu.fstec.ru/vul/2019-04676", "Source": "BDU" }, { "RefID": "BDU:2019-04677", "RefURL": "https://bdu.fstec.ru/vul/2019-04677", "Source": "BDU" }, { "RefID": "BDU:2020-00236", "RefURL": "https://bdu.fstec.ru/vul/2020-00236", "Source": "BDU" }, { "RefID": "BDU:2020-01595", "RefURL": "https://bdu.fstec.ru/vul/2020-01595", "Source": "BDU" }, { "RefID": "BDU:2020-02427", "RefURL": "https://bdu.fstec.ru/vul/2020-02427", "Source": "BDU" }, { "RefID": "BDU:2020-04348", "RefURL": "https://bdu.fstec.ru/vul/2020-04348", "Source": "BDU" }, { "RefID": "BDU:2021-01438", "RefURL": "https://bdu.fstec.ru/vul/2021-01438", "Source": "BDU" }, { "RefID": "BDU:2021-02663", "RefURL": "https://bdu.fstec.ru/vul/2021-02663", "Source": "BDU" }, { "RefID": "BDU:2021-03057", "RefURL": "https://bdu.fstec.ru/vul/2021-03057", "Source": "BDU" }, { "RefID": "BDU:2021-03088", "RefURL": "https://bdu.fstec.ru/vul/2021-03088", "Source": "BDU" }, { "RefID": "BDU:2021-03095", "RefURL": "https://bdu.fstec.ru/vul/2021-03095", "Source": "BDU" }, { "RefID": "BDU:2021-03177", "RefURL": "https://bdu.fstec.ru/vul/2021-03177", "Source": "BDU" }, { "RefID": "BDU:2022-07336", "RefURL": "https://bdu.fstec.ru/vul/2022-07336", "Source": "BDU" }, { "RefID": "BDU:2023-00629", "RefURL": "https://bdu.fstec.ru/vul/2023-00629", "Source": "BDU" }, { "RefID": "BDU:2023-00749", "RefURL": "https://bdu.fstec.ru/vul/2023-00749", "Source": "BDU" }, { "RefID": "CVE-2017-16911", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16911", "Source": "CVE" }, { "RefID": "CVE-2017-16912", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16912", "Source": "CVE" }, { "RefID": "CVE-2017-16913", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16913", "Source": "CVE" }, { "RefID": "CVE-2017-16914", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16914", "Source": "CVE" }, { "RefID": "CVE-2017-17863", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17863", "Source": "CVE" }, { "RefID": "CVE-2017-2636", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2636", "Source": "CVE" }, { "RefID": "CVE-2017-6353", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6353", "Source": "CVE" }, { "RefID": "CVE-2017-8061", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8061", "Source": "CVE" }, { "RefID": "CVE-2017-8066", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8066", "Source": "CVE" }, { "RefID": "CVE-2017-8797", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8797", "Source": "CVE" }, { "RefID": "CVE-2018-10883", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883", "Source": "CVE" }, { "RefID": "CVE-2018-11232", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-11232", "Source": "CVE" }, { "RefID": "CVE-2019-11479", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479", "Source": "CVE" }, { "RefID": "CVE-2019-11815", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11815", "Source": "CVE" }, { "RefID": "CVE-2019-14821", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821", "Source": "CVE" }, { "RefID": "CVE-2019-14835", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14835", "Source": "CVE" }, { "RefID": "CVE-2019-15538", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15538", "Source": "CVE" }, { "RefID": "CVE-2019-15902", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15902", "Source": "CVE" }, { "RefID": "CVE-2019-16995", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16995", "Source": "CVE" }, { "RefID": "CVE-2019-18805", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "Source": "CVE" }, { "RefID": "CVE-2019-8980", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980", "Source": "CVE" }, { "RefID": "CVE-2019-9213", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213", "Source": "CVE" }, { "RefID": "CVE-2020-10732", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732", "Source": "CVE" }, { "RefID": "CVE-2020-12114", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "Source": "CVE" }, { "RefID": "CVE-2020-24586", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586", "Source": "CVE" }, { "RefID": "CVE-2020-24587", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587", "Source": "CVE" }, { "RefID": "CVE-2020-24588", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588", "Source": "CVE" }, { "RefID": "CVE-2020-25220", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25220", "Source": "CVE" }, { "RefID": "CVE-2020-26147", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147", "Source": "CVE" }, { "RefID": "CVE-2022-41858", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858", "Source": "CVE" }, { "RefID": "CVE-2022-4378", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378", "Source": "CVE" }, { "RefID": "CVE-2023-0045", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0045", "Source": "CVE" } ], "Description": "This update upgrades kernel-image-un-def to version 4.10.3-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01086: Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-01091: Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2018-00574: Уязвимость функции stub_send_ret_submit ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00575: Уязвимость функции stub_recv_cmd_submit ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00576: Уязвимость функции get_pipe ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00818: Уязвимость функции kernel_read_file ядра операционной системы Linux, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01060: Уязвимость функции jbd2_journal_dirty_metadata() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02196: Уязвимость ядра операционной системы Linux, вызванная ошибками при обработке сегментов минимального размера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04515: Уязвимость функции dwc3_pci_probe() (drivers/usb/dwc3/dwc3-pci.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04676: Уязвимость ядра Linux, связанная с переполнения буфера виртуальной памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2019-04677: Уязвимость функции Coalesced_MMIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-00236: Уязвимость подсистемы ptrace ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-01595: Уязвимость функции rds_tcp_kill_sock ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02427: Уязвимость функции pivot_root (fs/namespace.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04348: Уязвимость функции cgroups ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-01438: Уязвимость функции expand_downwards ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02663: Уязвимость набора стандартов связи для коммуникации IEEE 802.11 операционной системы Windows, позволяющая нарушителю внедрить произвольные сетевые пакеты\n\n * BDU:2021-03057: Уязвимость функции fill_thread_core_info() ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию и вызвать отказ в обслуживании\n\n * BDU:2021-03088: Уязвимость реализации алгоритмов WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03095: Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю внедрить произвольные сетевые пакеты и/или оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03177: Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2022-07336: Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00629: Уязвимость функции sl_tx_timeout() в модуле drivers/net/slip.c драйвера SLIP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00749: Уязвимость функции ib_prctl_set() ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации.\n\n * CVE-2017-16911: The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.\n\n * CVE-2017-16912: The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.\n\n * CVE-2017-16913: The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.\n\n * CVE-2017-16914: The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.\n\n * CVE-2017-17863: kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.\n\n * CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.\n\n * CVE-2017-6353: net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.\n\n * CVE-2017-8061: drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.\n\n * CVE-2017-8066: drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.\n\n * CVE-2017-8797: The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.\n\n * CVE-2018-10883: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.\n\n * CVE-2018-11232: The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.\n\n * CVE-2019-11479: Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.\n\n * CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.\n\n * CVE-2019-14821: An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-\u003efirst' and 'ring-\u003elast' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.\n\n * CVE-2019-14835: A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.\n\n * CVE-2019-15538: An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vector, but it might result as well in remote DoS if the XFS filesystem is exported for instance via NFS.\n\n * CVE-2019-15902: A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.\n\n * CVE-2019-16995: In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.\n\n * CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.\n\n * CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.\n\n * CVE-2019-9213: In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.\n\n * CVE-2020-10732: A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.\n\n * CVE-2020-12114: A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.\n\n * CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.\n\n * CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.\n\n * CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.\n\n * CVE-2020-25220: The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd-\u003eno_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.\n\n * CVE-2020-26147: An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.\n\n * CVE-2022-41858: A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.\n\n * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2023-0045: The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set  function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall.  The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n", "Advisory": { "From": "errata.altlinux.org", "Severity": "Critical", "Rights": "Copyright 2024 BaseALT Ltd.", "Issued": { "Date": "2017-03-17" }, "Updated": { "Date": "2017-03-17" }, "BDUs": [ { "ID": "BDU:2017-01086", "CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-119", "Href": "https://bdu.fstec.ru/vul/2017-01086", "Impact": "High", "Public": "20170303" }, { "ID": "BDU:2017-01091", "CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-119", "Href": "https://bdu.fstec.ru/vul/2017-01091", "Impact": "High", "Public": "20170308" }, { "ID": "BDU:2018-00574", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-476", "Href": "https://bdu.fstec.ru/vul/2018-00574", "Impact": "Low", "Public": "20171208" }, { "ID": "BDU:2018-00575", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-119", "Href": "https://bdu.fstec.ru/vul/2018-00575", "Impact": "Low", "Public": "20171208" }, { "ID": "BDU:2018-00576", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://bdu.fstec.ru/vul/2018-00576", "Impact": "Low", "Public": "20171208" }, { "ID": "BDU:2019-00818", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-399, CWE-401", "Href": "https://bdu.fstec.ru/vul/2019-00818", "Impact": "High", "Public": "20190221" }, { "ID": "BDU:2019-01060", "CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-787", "Href": "https://bdu.fstec.ru/vul/2019-01060", "Impact": "Low", "Public": "20180616" }, { "ID": "BDU:2019-02196", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-400, CWE-405, CWE-770", "Href": "https://bdu.fstec.ru/vul/2019-02196", "Impact": "High", "Public": "20190615" }, { "ID": "BDU:2019-04515", "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-190", "Href": "https://bdu.fstec.ru/vul/2019-04515", "Impact": "Critical", "Public": "20190417" }, { "ID": "BDU:2019-04676", "CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-120", "Href": "https://bdu.fstec.ru/vul/2019-04676", "Impact": "High", "Public": "20190911" }, { "ID": "BDU:2019-04677", "CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://bdu.fstec.ru/vul/2019-04677", "Impact": "High", "Public": "20190918" }, { "ID": "BDU:2020-00236", "CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N", "CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "CWE": "CWE-200", "Href": "https://bdu.fstec.ru/vul/2020-00236", "Impact": "Low", "Public": "20190904" }, { "ID": "BDU:2020-01595", "CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-362, CWE-416", "Href": "https://bdu.fstec.ru/vul/2020-01595", "Impact": "High", "Public": "20190328" }, { "ID": "BDU:2020-02427", "CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C", "CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-362", "Href": "https://bdu.fstec.ru/vul/2020-02427", "Impact": "Low", "Public": "20200504" }, { "ID": "BDU:2020-04348", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://bdu.fstec.ru/vul/2020-04348", "Impact": "High", "Public": "20200821" }, { "ID": "BDU:2021-01438", "CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-476", "Href": "https://bdu.fstec.ru/vul/2021-01438", "Impact": "Low", "Public": "20190227" }, { "ID": "BDU:2021-02663", "CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "CWE": "CWE-306, CWE-327", "Href": "https://bdu.fstec.ru/vul/2021-02663", "Impact": "Low", "Public": "20210510" }, { "ID": "BDU:2021-03057", "CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:P", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "CWE": "CWE-200, CWE-908", "Href": "https://bdu.fstec.ru/vul/2021-03057", "Impact": "Low", "Public": "20200528" }, { "ID": "BDU:2021-03088", "CVSS": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "CVSS3": "AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "CWE": "CWE-326, CWE-327", "Href": "https://bdu.fstec.ru/vul/2021-03088", "Impact": "Low", "Public": "20210510" }, { "ID": "BDU:2021-03095", "CVSS": "AV:A/AC:M/Au:N/C:P/I:N/A:N", "CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2021-03095", "Impact": "Low", "Public": "20210510" }, { "ID": "BDU:2021-03177", "CVSS": "AV:A/AC:H/Au:N/C:P/I:P/A:N", "CVSS3": "AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2021-03177", "Impact": "Low", "Public": "20210510" }, { "ID": "BDU:2022-07336", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-474", "Href": "https://bdu.fstec.ru/vul/2022-07336", "Impact": "High", "Public": "20221116" }, { "ID": "BDU:2023-00629", "CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C", "CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "CWE": "CWE-416", "Href": "https://bdu.fstec.ru/vul/2023-00629", "Impact": "High", "Public": "20220406" }, { "ID": "BDU:2023-00749", "CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "CWE": "CWE-610, CWE-662", "Href": "https://bdu.fstec.ru/vul/2023-00749", "Impact": "High", "Public": "20230104" } ], "CVEs": [ { "ID": "CVE-2017-16911", "CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "CWE": "CWE-200", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16911", "Impact": "Low", "Public": "20180131" }, { "ID": "CVE-2017-16912", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16912", "Impact": "Low", "Public": "20180131" }, { "ID": "CVE-2017-16913", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-119", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16913", "Impact": "Low", "Public": "20180131" }, { "ID": "CVE-2017-16914", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-476", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16914", "Impact": "Low", "Public": "20180131" }, { "ID": "CVE-2017-17863", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-190", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17863", "Impact": "High", "Public": "20171227" }, { "ID": "CVE-2017-2636", "CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-362", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2636", "Impact": "High", "Public": "20170307" }, { "ID": "CVE-2017-6353", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-415", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6353", "Impact": "Low", "Public": "20170301" }, { "ID": "CVE-2017-8061", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-119", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8061", "Impact": "High", "Public": "20170423" }, { "ID": "CVE-2017-8066", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-119", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8066", "Impact": "High", "Public": "20170423" }, { "ID": "CVE-2017-8797", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-129", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8797", "Impact": "High", "Public": "20170702" }, { "ID": "CVE-2018-10883", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883", "Impact": "Low", "Public": "20180730" }, { "ID": "CVE-2018-11232", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-11232", "Impact": "Low", "Public": "20180518" }, { "ID": "CVE-2019-11479", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-770", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479", "Impact": "High", "Public": "20190619" }, { "ID": "CVE-2019-11815", "CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-362", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11815", "Impact": "High", "Public": "20190508" }, { "ID": "CVE-2019-14821", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821", "Impact": "High", "Public": "20190919" }, { "ID": "CVE-2019-14835", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14835", "Impact": "High", "Public": "20190917" }, { "ID": "CVE-2019-15538", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-400", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15538", "Impact": "High", "Public": "20190825" }, { "ID": "CVE-2019-15902", "CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "CWE": "CWE-200", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15902", "Impact": "Low", "Public": "20190904" }, { "ID": "CVE-2019-16995", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16995", "Impact": "High", "Public": "20190930" }, { "ID": "CVE-2019-18805", "CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-190", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "Impact": "Critical", "Public": "20191107" }, { "ID": "CVE-2019-8980", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-401", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980", "Impact": "High", "Public": "20190221" }, { "ID": "CVE-2019-9213", "CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-476", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213", "Impact": "Low", "Public": "20190305" }, { "ID": "CVE-2020-10732", "CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732", "Impact": "Low", "Public": "20200612" }, { "ID": "CVE-2020-12114", "CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-362", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "Impact": "Low", "Public": "20200504" }, { "ID": "CVE-2020-24586", "CVSS": "AV:A/AC:M/Au:N/C:P/I:N/A:N", "CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "CWE": "NVD-CWE-Other", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586", "Impact": "Low", "Public": "20210511" }, { "ID": "CVE-2020-24587", "CVSS": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "CWE": "CWE-327", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587", "Impact": "Low", "Public": "20210511" }, { "ID": "CVE-2020-24588", "CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "CWE": "CWE-327", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588", "Impact": "Low", "Public": "20210511" }, { "ID": "CVE-2020-25220", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25220", "Impact": "High", "Public": "20200910" }, { "ID": "CVE-2020-26147", "CVSS": "AV:A/AC:H/Au:N/C:P/I:P/A:N", "CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "CWE": "NVD-CWE-Other", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147", "Impact": "Low", "Public": "20210511" }, { "ID": "CVE-2022-41858", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "CWE": "CWE-476", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858", "Impact": "High", "Public": "20230117" }, { "ID": "CVE-2022-4378", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378", "Impact": "High", "Public": "20230105" }, { "ID": "CVE-2023-0045", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "CWE": "CWE-610", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0045", "Impact": "High", "Public": "20230425" } ], "AffectedCPEs": { "CPEs": [ "cpe:/o:alt:container:11" ] } } }, "Criteria": { "Operator": "AND", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:3001", "Comment": "ALT Linux must be installed" } ], "Criterias": [ { "Operator": "OR", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:20171299001", "Comment": "kernel-doc-un is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299002", "Comment": "kernel-headers-modules-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299003", "Comment": "kernel-headers-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299004", "Comment": "kernel-image-domU-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299005", "Comment": "kernel-image-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299006", "Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299007", "Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299008", "Comment": "kernel-modules-drm-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299009", "Comment": "kernel-modules-ide-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299010", "Comment": "kernel-modules-kvm-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299011", "Comment": "kernel-modules-staging-un-def is earlier than 1:4.10.3-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20171299012", "Comment": "kernel-modules-v4l-un-def is earlier than 1:4.10.3-alt1" } ] } ] } } ] }