vuln-list-alt/oval/c10f1/ALT-PU-2021-3050/definitions.json
2024-12-12 21:07:30 +00:00

1787 lines
91 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213050",
"Version": "oval:org.altlinux.errata:def:20213050",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3050: package `chromium-gost` update to version 94.0.4606.71-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3050",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3050",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-04010",
"RefURL": "https://bdu.fstec.ru/vul/2021-04010",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04011",
"RefURL": "https://bdu.fstec.ru/vul/2021-04011",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04012",
"RefURL": "https://bdu.fstec.ru/vul/2021-04012",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04013",
"RefURL": "https://bdu.fstec.ru/vul/2021-04013",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04238",
"RefURL": "https://bdu.fstec.ru/vul/2021-04238",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04239",
"RefURL": "https://bdu.fstec.ru/vul/2021-04239",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04240",
"RefURL": "https://bdu.fstec.ru/vul/2021-04240",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04241",
"RefURL": "https://bdu.fstec.ru/vul/2021-04241",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04242",
"RefURL": "https://bdu.fstec.ru/vul/2021-04242",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04243",
"RefURL": "https://bdu.fstec.ru/vul/2021-04243",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04772",
"RefURL": "https://bdu.fstec.ru/vul/2021-04772",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04779",
"RefURL": "https://bdu.fstec.ru/vul/2021-04779",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04783",
"RefURL": "https://bdu.fstec.ru/vul/2021-04783",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04788",
"RefURL": "https://bdu.fstec.ru/vul/2021-04788",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04790",
"RefURL": "https://bdu.fstec.ru/vul/2021-04790",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04791",
"RefURL": "https://bdu.fstec.ru/vul/2021-04791",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04792",
"RefURL": "https://bdu.fstec.ru/vul/2021-04792",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04793",
"RefURL": "https://bdu.fstec.ru/vul/2021-04793",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04794",
"RefURL": "https://bdu.fstec.ru/vul/2021-04794",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04795",
"RefURL": "https://bdu.fstec.ru/vul/2021-04795",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04796",
"RefURL": "https://bdu.fstec.ru/vul/2021-04796",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05094",
"RefURL": "https://bdu.fstec.ru/vul/2021-05094",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05102",
"RefURL": "https://bdu.fstec.ru/vul/2021-05102",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05181",
"RefURL": "https://bdu.fstec.ru/vul/2021-05181",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05205",
"RefURL": "https://bdu.fstec.ru/vul/2021-05205",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05218",
"RefURL": "https://bdu.fstec.ru/vul/2021-05218",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05350",
"RefURL": "https://bdu.fstec.ru/vul/2021-05350",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05432",
"RefURL": "https://bdu.fstec.ru/vul/2021-05432",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05464",
"RefURL": "https://bdu.fstec.ru/vul/2021-05464",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05507",
"RefURL": "https://bdu.fstec.ru/vul/2021-05507",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05925",
"RefURL": "https://bdu.fstec.ru/vul/2021-05925",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06078",
"RefURL": "https://bdu.fstec.ru/vul/2021-06078",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06079",
"RefURL": "https://bdu.fstec.ru/vul/2021-06079",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06080",
"RefURL": "https://bdu.fstec.ru/vul/2021-06080",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06081",
"RefURL": "https://bdu.fstec.ru/vul/2021-06081",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06082",
"RefURL": "https://bdu.fstec.ru/vul/2021-06082",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06085",
"RefURL": "https://bdu.fstec.ru/vul/2021-06085",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06193",
"RefURL": "https://bdu.fstec.ru/vul/2021-06193",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06418",
"RefURL": "https://bdu.fstec.ru/vul/2021-06418",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06421",
"RefURL": "https://bdu.fstec.ru/vul/2021-06421",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06424",
"RefURL": "https://bdu.fstec.ru/vul/2021-06424",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06426",
"RefURL": "https://bdu.fstec.ru/vul/2021-06426",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06427",
"RefURL": "https://bdu.fstec.ru/vul/2021-06427",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06428",
"RefURL": "https://bdu.fstec.ru/vul/2021-06428",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06431",
"RefURL": "https://bdu.fstec.ru/vul/2021-06431",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00050",
"RefURL": "https://bdu.fstec.ru/vul/2022-00050",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00051",
"RefURL": "https://bdu.fstec.ru/vul/2022-00051",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00052",
"RefURL": "https://bdu.fstec.ru/vul/2022-00052",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00053",
"RefURL": "https://bdu.fstec.ru/vul/2022-00053",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00054",
"RefURL": "https://bdu.fstec.ru/vul/2022-00054",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00056",
"RefURL": "https://bdu.fstec.ru/vul/2022-00056",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00059",
"RefURL": "https://bdu.fstec.ru/vul/2022-00059",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00060",
"RefURL": "https://bdu.fstec.ru/vul/2022-00060",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00070",
"RefURL": "https://bdu.fstec.ru/vul/2022-00070",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00074",
"RefURL": "https://bdu.fstec.ru/vul/2022-00074",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00075",
"RefURL": "https://bdu.fstec.ru/vul/2022-00075",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00076",
"RefURL": "https://bdu.fstec.ru/vul/2022-00076",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00077",
"RefURL": "https://bdu.fstec.ru/vul/2022-00077",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00079",
"RefURL": "https://bdu.fstec.ru/vul/2022-00079",
"Source": "BDU"
},
{
"RefID": "CVE-2021-30590",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30590",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30591",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30591",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30592",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30592",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30593",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30593",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30594",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30594",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30596",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30596",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30597",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30597",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30598",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30598",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30599",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30599",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30600",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30600",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30601",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30601",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30602",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30602",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30603",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30603",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30604",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30604",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30606",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30606",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30607",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30607",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30608",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30608",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30609",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30610",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30610",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30611",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30611",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30612",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30612",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30613",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30613",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30614",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30614",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30615",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30615",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30616",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30616",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30617",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30617",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30618",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30618",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30619",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30619",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30620",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30620",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30621",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30621",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30622",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30622",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30623",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30623",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30624",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30624",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30625",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30625",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30626",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30626",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30627",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30627",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30628",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30628",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30629",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30629",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30630",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30630",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30631",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30631",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30632",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30632",
"Source": "CVE"
},
{
"RefID": "CVE-2021-30633",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30633",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37956",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37956",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37957",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37957",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37958",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37958",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37959",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37959",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37960",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37960",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37961",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37961",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37962",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37962",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37963",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37963",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37964",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37964",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37965",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37965",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37966",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37966",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37967",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37967",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37968",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37968",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37969",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37969",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37970",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37970",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37971",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37971",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37972",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37972",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37973",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37973",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37974",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37975",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37975",
"Source": "CVE"
},
{
"RefID": "CVE-2021-37976",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37976",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium-gost to version 94.0.4606.71-alt2. \nSecurity Fix(es):\n\n * BDU:2021-04010: Уязвимость элемента управления «Bookmarks» («Закладки») браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04011: Уязвимость интерфейса File System API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04012: Уязвимость компонента Tab Groups браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04013: Уязвимость компонента Page Info UI браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04238: Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04239: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04240: Уязвимость компонента Extensions API браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04241: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04242: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04243: Уязвимость функции печати браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04772: Уязвимость компонента макета модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04779: Уязвимость компонента входа в систему Sign-In браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04783: Уязвимость компонента Selection API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-04788: Уязвимость компонента Extensions API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-04790: Уязвимость модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04791: Уязвимость интерфейса для хранения структурированных данных Indexed DB API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-04792: Уязвимость компонента Permissions браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-04793: Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04794: Уязвимость компонента макета модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-04795: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-04796: Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2021-05094: Уязвимость функции TabStrip браузера Google Chrome, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2021-05102: Уязвимость набора инструментов DevTools браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2021-05181: Уязвимость компонента WebRTC веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-05205: Уязвимость компонента Browser UI веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-05218: Уязвимость компонента Tab Strip веб-браузера Google Chrome, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2021-05350: Уязвимость обработчика Java-Script сценариев Blink браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность\n\n * BDU:2021-05432: Уязвимость настройки разрешений Permissions браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-05464: Уязвимость прикладного программного интерфейса для обмена данными Web Share браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность\n\n * BDU:2021-05507: Уязвимость компонента Portals браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выйти из изолированной программной среды\n\n * BDU:2021-05925: Уязвимость компонента Navigation браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-06078: Уязвимость элемента управления «Bookmarks» («Закладки») браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06079: Уязвимость компонента автодополнения Autofill браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06080: Уязвимость компонента Media браузера Microsoft Edge, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06081: Уязвимость компонента автодополнения Autofill браузера Microsoft Edge, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-06082: Уязвимость модуля отображения Blink браузера Microsoft Edge, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2021-06085: Уязвимость установщика веб-приложений браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06193: Уязвимость кодека libjpeg-turbo, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2021-06418: Уязвимость расширения WebRTC браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06421: Уязвимость автономного режима браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить код в контексте привилегированного процесса\n\n * BDU:2021-06424: Уязвимость программного интерфейса Background Fetch API браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-06426: Уязвимость реализации функции автозаполнения Autofill браузера Microsoft Edge, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-06427: Уязвимость реализации технологии WebRTC браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2021-06428: Уязвимость функции Navigation браузера Google Chrome, связанная с недостатком в механизме подтверждения источника, позволяющая нарушителю подделать содержимое адресной строки\n\n * BDU:2021-06431: Уязвимость интерфейса File System API браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-00050: Уязвимость приложение для загрузки программ Google Updater браузера Google Chrome, операционной системы Windows , связанная с небезопасным управлением привилегиями, позволяющая нарушителю повысить свои привилегии через созданный файл\n\n * BDU:2022-00051: Уязвимость компонента Tab Strip браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00052: Уязвимость функции Navigation браузера Google Chrome, операционной системы Windows , позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00053: Уязвимость диспетчера задач браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольные команды\n\n * BDU:2022-00054: Уязвимость компонента ChromeOS Networking браузера Google Chrome, позволяющая нарушителю получить привилегированный доступ к инфраструктуре через созданный файл ONC\n\n * BDU:2022-00056: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00059: Уязвимость API для работы с компьютерной графикой WebGPU браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00060: Уязвимость компонента Performance Manager браузера Google Chrome, позволяющая нарушителю выполнить код в контексте привилегированного процесса с помощью специально созданной HTML страницы\n\n * BDU:2022-00070: Уязвимость механизма отображения веб-страниц Blink браузера Microsoft Edge, позволяющая нарушителю обойти существующую политику ограничения доступа\n\n * BDU:2022-00074: Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющие нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы\n\n * BDU:2022-00075: Уязвимость компонента compositing браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданной HTML страницы\n\n * BDU:2022-00076: Уязвимость программного интерфейса Background Fetch API браузера Google Chrome , связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00077: Уязвимость программного интерфейса Background Fetch API браузера Google Chrome, связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00079: Уязвимость браузера Microsoft Edge, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * CVE-2021-30590: Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30591: Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30592: Out of bounds write in Tab Groups in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.\n\n * CVE-2021-30593: Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2021-30594: Use after free in Page Info UI in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.\n\n * CVE-2021-30596: Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2021-30597: Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.\n\n * CVE-2021-30598: Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2021-30599: Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2021-30600: Use after free in Printing in Google Chrome prior to 92.0.4515.159 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30601: Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30602: Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30603: Data race in WebAudio in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30604: Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30606: Chromium: CVE-2021-30606 Use after free in Blink\n\n * CVE-2021-30607: Chromium: CVE-2021-30607 Use after free in Permissions\n\n * CVE-2021-30608: Chromium: CVE-2021-30608 Use after free in Web Share\n\n * CVE-2021-30609: Chromium: CVE-2021-30609 Use after free in Sign-In\n\n * CVE-2021-30610: Chromium: CVE-2021-30610 Use after free in Extensions API\n\n * CVE-2021-30611: Chromium: CVE-2021-30611 Use after free in WebRTC\n\n * CVE-2021-30612: Chromium: CVE-2021-30612 Use after free in WebRTC\n\n * CVE-2021-30613: Chromium: CVE-2021-30613 Use after free in Base internals\n\n * CVE-2021-30614: Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip\n\n * CVE-2021-30615: Chromium: CVE-2021-30615 Cross-origin data leak in Navigation\n\n * CVE-2021-30616: Chromium: CVE-2021-30616 Use after free in Media\n\n * CVE-2021-30617: Chromium: CVE-2021-30617 Policy bypass in Blink\n\n * CVE-2021-30618: Chromium: CVE-2021-30618 Inappropriate implementation in DevTools\n\n * CVE-2021-30619: Chromium: CVE-2021-30619 UI Spoofing in Autofill\n\n * CVE-2021-30620: Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink\n\n * CVE-2021-30621: Chromium: CVE-2021-30621 UI Spoofing in Autofill\n\n * CVE-2021-30622: Chromium: CVE-2021-30622 Use after free in WebApp Installs\n\n * CVE-2021-30623: Chromium: CVE-2021-30623 Use after free in Bookmarks\n\n * CVE-2021-30624: Chromium: CVE-2021-30624 Use after free in Autofill\n\n * CVE-2021-30625: Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30626: Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30627: Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30628: Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.\n\n * CVE-2021-30629: Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30630: Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-30631: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none\n\n * CVE-2021-30632: Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-30633: Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2021-37956: Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37957: Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37958: Inappropriate implementation in Navigation in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.\n\n * CVE-2021-37959: Use after free in Task Manager in Google Chrome prior to 94.0.4606.54 allowed an attacker who convinced a user to enage in a series of user gestures to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37960: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none\n\n * CVE-2021-37961: Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37962: Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37963: Side-channel information leakage in DevTools in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2021-37964: Inappropriate implementation in ChromeOS Networking in Google Chrome on ChromeOS prior to 94.0.4606.54 allowed an attacker with a rogue wireless access point to to potentially carryout a wifi impersonation attack via a crafted ONC file.\n\n * CVE-2021-37965: Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-37966: Inappropriate implementation in Compositing in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2021-37967: Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-37968: Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-37969: Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.\n\n * CVE-2021-37970: Use after free in File System API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37971: Incorrect security UI in Web Browser UI in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2021-37972: Out of bounds read in libjpeg-turbo in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37973: Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2021-37974: Use after free in Safebrowsing in Google Chrome prior to 94.0.4606.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37975: Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-37976: Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * #40806: Собрать с поддержкой pipewire\n\n * #41094: Не запускается chromium-gost из консоли и из меню",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-10-16"
},
"Updated": {
"Date": "2021-10-16"
},
"BDUs": [
{
"ID": "BDU:2021-04010",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2021-04010",
"Impact": "High",
"Public": "20210709"
},
{
"ID": "BDU:2021-04011",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04011",
"Impact": "High",
"Public": "20210714"
},
{
"ID": "BDU:2021-04012",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-04012",
"Impact": "High",
"Public": "20210515"
},
{
"ID": "BDU:2021-04013",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04013",
"Impact": "High",
"Public": "20210610"
},
{
"ID": "BDU:2021-04238",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04238",
"Impact": "High",
"Public": "20210730"
},
{
"ID": "BDU:2021-04239",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2021-04239",
"Impact": "High",
"Public": "20210727"
},
{
"ID": "BDU:2021-04240",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04240",
"Impact": "High",
"Public": "20210728"
},
{
"ID": "BDU:2021-04241",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-04241",
"Impact": "High",
"Public": "20210730"
},
{
"ID": "BDU:2021-04242",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-04242",
"Impact": "High",
"Public": "20210730"
},
{
"ID": "BDU:2021-04243",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04243",
"Impact": "High",
"Public": "20210720"
},
{
"ID": "BDU:2021-04772",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-04772",
"Impact": "High",
"Public": "20210901"
},
{
"ID": "BDU:2021-04779",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04779",
"Impact": "High",
"Public": "20210813"
},
{
"ID": "BDU:2021-04783",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04783",
"Impact": "High",
"Public": "20210806"
},
{
"ID": "BDU:2021-04788",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04788",
"Impact": "High",
"Public": "20210419"
},
{
"ID": "BDU:2021-04790",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-04790",
"Impact": "High",
"Public": "20210830"
},
{
"ID": "BDU:2021-04791",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04791",
"Impact": "High",
"Public": "20210908"
},
{
"ID": "BDU:2021-04792",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04792",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "BDU:2021-04793",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-04793",
"Impact": "High",
"Public": "20210908"
},
{
"ID": "BDU:2021-04794",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-04794",
"Impact": "High",
"Public": "20210906"
},
{
"ID": "BDU:2021-04795",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-121",
"Href": "https://bdu.fstec.ru/vul/2021-04795",
"Impact": "High",
"Public": "20210818"
},
{
"ID": "BDU:2021-04796",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04796",
"Impact": "High",
"Public": "20210818"
},
{
"ID": "BDU:2021-05094",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-05094",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-05102",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2021-05102",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-05181",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05181",
"Impact": "High",
"Public": "20210719"
},
{
"ID": "BDU:2021-05205",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05205",
"Impact": "Low",
"Public": "20210724"
},
{
"ID": "BDU:2021-05218",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-05218",
"Impact": "High",
"Public": "20210516"
},
{
"ID": "BDU:2021-05350",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05350",
"Impact": "High",
"Public": "20210831"
},
{
"ID": "BDU:2021-05432",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05432",
"Impact": "High",
"Public": "20210831"
},
{
"ID": "BDU:2021-05464",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05464",
"Impact": "High",
"Public": "20210831"
},
{
"ID": "BDU:2021-05507",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05507",
"Impact": "Critical",
"Public": "20210921"
},
{
"ID": "BDU:2021-05925",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-668",
"Href": "https://bdu.fstec.ru/vul/2021-05925",
"Impact": "Low",
"Public": "20210512"
},
{
"ID": "BDU:2021-06078",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06078",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-06079",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06079",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-06080",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06080",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-06081",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2021-06081",
"Impact": "Low",
"Public": "20210903"
},
{
"ID": "BDU:2021-06082",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-06082",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-06085",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06085",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-06193",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-06193",
"Impact": "Low",
"Public": "20210921"
},
{
"ID": "BDU:2021-06418",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06418",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-06421",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06421",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "BDU:2021-06424",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2021-06424",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "BDU:2021-06426",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2021-06426",
"Impact": "Low",
"Public": "20210903"
},
{
"ID": "BDU:2021-06427",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06427",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "BDU:2021-06428",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2021-06428",
"Impact": "Low",
"Public": "20210826"
},
{
"ID": "BDU:2021-06431",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06431",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "BDU:2022-00050",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2022-00050",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "BDU:2022-00051",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00051",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "BDU:2022-00052",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00052",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "BDU:2022-00053",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00053",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "BDU:2022-00054",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00054",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "BDU:2022-00056",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-1021",
"Href": "https://bdu.fstec.ru/vul/2022-00056",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "BDU:2022-00059",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00059",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "BDU:2022-00060",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00060",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "BDU:2022-00070",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2022-00070",
"Impact": "Low",
"Public": "20210903"
},
{
"ID": "BDU:2022-00074",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2022-00074",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "BDU:2022-00075",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2022-00075",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "BDU:2022-00076",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-00076",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "BDU:2022-00077",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-00077",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "BDU:2022-00079",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00079",
"Impact": "High",
"Public": "20210903"
}
],
"CVEs": [
{
"ID": "CVE-2021-30590",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30590",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30591",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30591",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30592",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30592",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30593",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30593",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30594",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30594",
"Impact": "Low",
"Public": "20210826"
},
{
"ID": "CVE-2021-30596",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30596",
"Impact": "Low",
"Public": "20210826"
},
{
"ID": "CVE-2021-30597",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30597",
"Impact": "Low",
"Public": "20210826"
},
{
"ID": "CVE-2021-30598",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30598",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30599",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30599",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30600",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30600",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30601",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30601",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30602",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30602",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30603",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30603",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30604",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30604",
"Impact": "High",
"Public": "20210826"
},
{
"ID": "CVE-2021-30606",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30606",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30607",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30607",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30608",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30608",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30609",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30609",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30610",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30610",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30611",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30611",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30612",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30612",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30613",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30613",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30614",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30614",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30615",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30615",
"Impact": "Low",
"Public": "20210903"
},
{
"ID": "CVE-2021-30616",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30616",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30617",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30617",
"Impact": "Low",
"Public": "20210903"
},
{
"ID": "CVE-2021-30618",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30618",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30619",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30619",
"Impact": "Low",
"Public": "20210903"
},
{
"ID": "CVE-2021-30620",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30620",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30621",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30621",
"Impact": "Low",
"Public": "20210903"
},
{
"ID": "CVE-2021-30622",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30622",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30623",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30623",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30624",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30624",
"Impact": "High",
"Public": "20210903"
},
{
"ID": "CVE-2021-30625",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30625",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-30626",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30626",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-30627",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30627",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-30628",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30628",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-30629",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30629",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-30630",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30630",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-30631",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30631",
"Impact": "None",
"Public": "20211102"
},
{
"ID": "CVE-2021-30632",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30632",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-30633",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30633",
"Impact": "Critical",
"Public": "20211008"
},
{
"ID": "CVE-2021-37956",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37956",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37957",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37957",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37958",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37958",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-37959",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37959",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37960",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37960",
"Impact": "None",
"Public": "20211102"
},
{
"ID": "CVE-2021-37961",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37961",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37962",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37962",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37963",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37963",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-37964",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37964",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-37965",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37965",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-37966",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37966",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-37967",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37967",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-37968",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37968",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-37969",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37969",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37970",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37970",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37971",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-1021",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37971",
"Impact": "Low",
"Public": "20211008"
},
{
"ID": "CVE-2021-37972",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37972",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37973",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37973",
"Impact": "Critical",
"Public": "20211008"
},
{
"ID": "CVE-2021-37974",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37974",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37975",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37975",
"Impact": "High",
"Public": "20211008"
},
{
"ID": "CVE-2021-37976",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37976",
"Impact": "Low",
"Public": "20211008"
}
],
"Bugzilla": [
{
"ID": "40806",
"Href": "https://bugzilla.altlinux.org/40806",
"Data": "Собрать с поддержкой pipewire"
},
{
"ID": "41094",
"Href": "https://bugzilla.altlinux.org/41094",
"Data": "Не запускается chromium-gost из консоли и из меню"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213050001",
"Comment": "chromium-gost is earlier than 0:94.0.4606.71-alt2"
}
]
}
]
}
}
]
}