2025-03-03 12:05:02 +00:00

516 lines
26 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211531",
"Version": "oval:org.altlinux.errata:def:20211531",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1531: package `kernel-image-old-def` update to version 4.19.182-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1531",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1531",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-04812",
"RefURL": "https://bdu.fstec.ru/vul/2019-04812",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04876",
"RefURL": "https://bdu.fstec.ru/vul/2019-04876",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04892",
"RefURL": "https://bdu.fstec.ru/vul/2019-04892",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00352",
"RefURL": "https://bdu.fstec.ru/vul/2020-00352",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04348",
"RefURL": "https://bdu.fstec.ru/vul/2020-04348",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05454",
"RefURL": "https://bdu.fstec.ru/vul/2020-05454",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00005",
"RefURL": "https://bdu.fstec.ru/vul/2021-00005",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00014",
"RefURL": "https://bdu.fstec.ru/vul/2021-00014",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00106",
"RefURL": "https://bdu.fstec.ru/vul/2021-00106",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01688",
"RefURL": "https://bdu.fstec.ru/vul/2021-01688",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03189",
"RefURL": "https://bdu.fstec.ru/vul/2021-03189",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03394",
"RefURL": "https://bdu.fstec.ru/vul/2021-03394",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01284",
"RefURL": "https://bdu.fstec.ru/vul/2023-01284",
"Source": "BDU"
},
{
"RefID": "CVE-2018-20669",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20669",
"Source": "CVE"
},
{
"RefID": "CVE-2019-0145",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-0145",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19061",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19061",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19074",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19816",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19816",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14356",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14386",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25220",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25220",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25643",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25669",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25669",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27784",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27784",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29569",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29569",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29661",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661",
"Source": "CVE"
},
{
"RefID": "CVE-2021-28660",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28660",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1390",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-old-def to version 4.19.182-alt1. \nSecurity Fix(es):\n\n * BDU:2019-04812: Уязвимость функции adis_update_scan_mode_burst() (drivers/iio/imu/adis_buffer.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04876: Уязвимость драйвера i40e контроллеров Intel Ethernet серии 700, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-04892: Уязвимость драйвера drivers/net/wireless/ath/ath9k/htc_hst.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00352: Уязвимость функции __btrfs_map_block ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04348: Уязвимость функции cgroups ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-05454: Уязвимость функции sunkbd_reinit() (drivers/input/keyboard/sunkbd.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00005: Уязвимость компонента drivers/tty/tty_jobctrl.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00014: Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00106: Уязвимость модуля HDLC_PPP ядра операционной системы Linux, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01688: Уязвимость функции rtw_wx_set_scan() (drivers/staging/rtl8188eu/os_dep/ioctl_linux.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03189: Уязвимость подсистемы cgroupv2 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2021-03394: Уязвимость компонента net/packet/af_packet.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2023-01284: Уязвимость реализации протокола TIPC (Transparent Inter Process Communication) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-20669: An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.\n\n * CVE-2019-0145: Buffer overflow in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable an escalation of privilege via local access.\n\n * CVE-2019-19061: A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.\n\n * CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n\n * CVE-2019-19816: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled.\n\n * CVE-2020-14356: A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.\n\n * CVE-2020-14386: A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.\n\n * CVE-2020-25220: The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd-\u003eno_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.\n\n * CVE-2020-25643: A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2020-25669: A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.\n\n * CVE-2020-27784: A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().\n\n * CVE-2020-29569: An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.\n\n * CVE-2020-29661: A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.\n\n * CVE-2021-28660: rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.\n\n * CVE-2023-1390: A remote denial of service vulnerability was found in the Linux kernels TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2025 BaseALT Ltd.",
"Issued": {
"Date": "2021-03-22"
},
"Updated": {
"Date": "2021-03-22"
},
"BDUs": [
{
"ID": "BDU:2019-04812",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04812",
"Impact": "High",
"Public": "20191009"
},
{
"ID": "BDU:2019-04876",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-04876",
"Impact": "High",
"Public": "20190504"
},
{
"ID": "BDU:2019-04892",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04892",
"Impact": "High",
"Public": "20190910"
},
{
"ID": "BDU:2020-00352",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-00352",
"Impact": "High",
"Public": "20190429"
},
{
"ID": "BDU:2020-04348",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-04348",
"Impact": "High",
"Public": "20200821"
},
{
"ID": "BDU:2020-05454",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05454",
"Impact": "High",
"Public": "20201108"
},
{
"ID": "BDU:2021-00005",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2021-00005",
"Impact": "High",
"Public": "20201204"
},
{
"ID": "BDU:2021-00014",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-252, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00014",
"Impact": "High",
"Public": "20201214"
},
{
"ID": "BDU:2021-00106",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00106",
"Impact": "High",
"Public": "20201006"
},
{
"ID": "BDU:2021-01688",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-01688",
"Impact": "High",
"Public": "20210310"
},
{
"ID": "BDU:2021-03189",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-03189",
"Impact": "High",
"Public": "20200707"
},
{
"ID": "BDU:2021-03394",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-250, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-03394",
"Impact": "High",
"Public": "20200904"
},
{
"ID": "BDU:2023-01284",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476, CWE-1050",
"Href": "https://bdu.fstec.ru/vul/2023-01284",
"Impact": "High",
"Public": "20210109"
}
],
"CVEs": [
{
"ID": "CVE-2018-20669",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20669",
"Impact": "High",
"Public": "20190321"
},
{
"ID": "CVE-2019-0145",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-0145",
"Impact": "High",
"Public": "20191114"
},
{
"ID": "CVE-2019-19061",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19061",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19074",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19816",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19816",
"Impact": "High",
"Public": "20191217"
},
{
"ID": "CVE-2020-14356",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356",
"Impact": "High",
"Public": "20200819"
},
{
"ID": "CVE-2020-14386",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386",
"Impact": "High",
"Public": "20200916"
},
{
"ID": "CVE-2020-25220",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25220",
"Impact": "High",
"Public": "20200910"
},
{
"ID": "CVE-2020-25643",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643",
"Impact": "High",
"Public": "20201006"
},
{
"ID": "CVE-2020-25669",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25669",
"Impact": "High",
"Public": "20210526"
},
{
"ID": "CVE-2020-27784",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27784",
"Impact": "Low",
"Public": "20220901"
},
{
"ID": "CVE-2020-29569",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29569",
"Impact": "High",
"Public": "20201215"
},
{
"ID": "CVE-2020-29661",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661",
"Impact": "High",
"Public": "20201209"
},
{
"ID": "CVE-2021-28660",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28660",
"Impact": "High",
"Public": "20210317"
},
{
"ID": "CVE-2023-1390",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390",
"Impact": "High",
"Public": "20230316"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211531001",
"Comment": "kernel-doc-old is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531002",
"Comment": "kernel-headers-modules-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531003",
"Comment": "kernel-headers-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531004",
"Comment": "kernel-image-domU-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531005",
"Comment": "kernel-image-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531006",
"Comment": "kernel-modules-drm-ancient-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531007",
"Comment": "kernel-modules-drm-nouveau-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531008",
"Comment": "kernel-modules-drm-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531009",
"Comment": "kernel-modules-drm-radeon-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531010",
"Comment": "kernel-modules-ide-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531011",
"Comment": "kernel-modules-staging-old-def is earlier than 1:4.19.182-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211531012",
"Comment": "kernel-modules-v4l-old-def is earlier than 1:4.19.182-alt1"
}
]
}
]
}
}
]
}