2024-06-28 13:17:52 +00:00

531 lines
28 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20203536",
"Version": "oval:org.altlinux.errata:def:20203536",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-3536: package `kernel-image-un-def` update to version 5.10.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-3536",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3536",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-04797",
"RefURL": "https://bdu.fstec.ru/vul/2020-04797",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05454",
"RefURL": "https://bdu.fstec.ru/vul/2020-05454",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05539",
"RefURL": "https://bdu.fstec.ru/vul/2020-05539",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05831",
"RefURL": "https://bdu.fstec.ru/vul/2020-05831",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00005",
"RefURL": "https://bdu.fstec.ru/vul/2021-00005",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00006",
"RefURL": "https://bdu.fstec.ru/vul/2021-00006",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01617",
"RefURL": "https://bdu.fstec.ru/vul/2021-01617",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02982",
"RefURL": "https://bdu.fstec.ru/vul/2021-02982",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03412",
"RefURL": "https://bdu.fstec.ru/vul/2021-03412",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03443",
"RefURL": "https://bdu.fstec.ru/vul/2021-03443",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05916",
"RefURL": "https://bdu.fstec.ru/vul/2022-05916",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00628",
"RefURL": "https://bdu.fstec.ru/vul/2023-00628",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02799",
"RefURL": "https://bdu.fstec.ru/vul/2023-02799",
"Source": "BDU"
},
{
"RefID": "CVE-2020-12351",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25656",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25669",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25669",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25705",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27777",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27830",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27830",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28588",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28588",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28941",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28941",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29660",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29661",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36385",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36694",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694",
"Source": "CVE"
},
{
"RefID": "CVE-2020-4788",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3411",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3411",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0240",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 5.10.0-alt1. \nSecurity Fix(es):\n\n * BDU:2020-04797: Уязвимость компонента net/bluetooth/l2cap_core.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2020-05454: Уязвимость функции sunkbd_reinit() (drivers/input/keyboard/sunkbd.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05539: Уязвимость ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05831: Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-00005: Уязвимость компонента drivers/tty/tty_jobctrl.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00006: Уязвимость компонентов drivers/tty/tty_jobctrl.c и drivers/tty/tty_io.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-01617: Уязвимость функции can_optimize (arch/x86/kernel/kprobes/opt.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02982: Уязвимость реализации системного вызова (/proc/pid/syscall) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-03412: Уязвимость ядра операционной системы Linux, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-03443: Уязвимость компонента RTAS ядра операционной системы Linux, связанная с отсутствием механизма авторизации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05916: Уязвимость компонента drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-00628: Уязвимость функции io_prep_async_work() подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-02799: Уязвимость функции xt_replace_table() в модуле net/netfilter/x_tables.c межсетевого экрана netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2020-12351: Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.\n\n * CVE-2020-25656: A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.\n\n * CVE-2020-25669: A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.\n\n * CVE-2020-25705: A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version\n\n * CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.\n\n * CVE-2020-27830: A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.\n\n * CVE-2020-28588: An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so its likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.\n\n * CVE-2020-28941: An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.\n\n * CVE-2020-29660: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.\n\n * CVE-2020-29661: A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.\n\n * CVE-2020-36385: An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.\n\n * CVE-2020-36694: An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.\n\n * CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.\n\n * CVE-2021-3411: A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2023-0240: There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.\n\nIn the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-12-18"
},
"Updated": {
"Date": "2020-12-18"
},
"BDUs": [
{
"ID": "BDU:2020-04797",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-04797",
"Impact": "High",
"Public": "20200925"
},
{
"ID": "BDU:2020-05454",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05454",
"Impact": "High",
"Public": "20201108"
},
{
"ID": "BDU:2020-05539",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://bdu.fstec.ru/vul/2020-05539",
"Impact": "High",
"Public": "20201016"
},
{
"ID": "BDU:2020-05831",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05831",
"Impact": "Low",
"Public": "20201028"
},
{
"ID": "BDU:2021-00005",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2021-00005",
"Impact": "High",
"Public": "20201204"
},
{
"ID": "BDU:2021-00006",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2021-00006",
"Impact": "Low",
"Public": "20201204"
},
{
"ID": "BDU:2021-01617",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://bdu.fstec.ru/vul/2021-01617",
"Impact": "Low",
"Public": "20200908"
},
{
"ID": "BDU:2021-02982",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-681, CWE-704",
"Href": "https://bdu.fstec.ru/vul/2021-02982",
"Impact": "Low",
"Public": "20201203"
},
{
"ID": "BDU:2021-03412",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-03412",
"Impact": "Low",
"Public": "20201120"
},
{
"ID": "BDU:2021-03443",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://bdu.fstec.ru/vul/2021-03443",
"Impact": "Low",
"Public": "20201006"
},
{
"ID": "BDU:2022-05916",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05916",
"Impact": "High",
"Public": "20200918"
},
{
"ID": "BDU:2023-00628",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00628",
"Impact": "High",
"Public": "20210221"
},
{
"ID": "BDU:2023-02799",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02799",
"Impact": "Critical",
"Public": "20210315"
}
],
"CVEs": [
{
"ID": "CVE-2020-12351",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351",
"Impact": "High",
"Public": "20201123"
},
{
"ID": "CVE-2020-25656",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25656",
"Impact": "Low",
"Public": "20201202"
},
{
"ID": "CVE-2020-25669",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25669",
"Impact": "High",
"Public": "20210526"
},
{
"ID": "CVE-2020-25705",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705",
"Impact": "High",
"Public": "20201117"
},
{
"ID": "CVE-2020-27777",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"Impact": "Low",
"Public": "20201215"
},
{
"ID": "CVE-2020-27830",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27830",
"Impact": "Low",
"Public": "20210513"
},
{
"ID": "CVE-2020-28588",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-681",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28588",
"Impact": "Low",
"Public": "20210510"
},
{
"ID": "CVE-2020-28941",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-763",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28941",
"Impact": "Low",
"Public": "20201119"
},
{
"ID": "CVE-2020-29660",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"Impact": "Low",
"Public": "20201209"
},
{
"ID": "CVE-2020-29661",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661",
"Impact": "High",
"Public": "20201209"
},
{
"ID": "CVE-2020-36385",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"Impact": "High",
"Public": "20210607"
},
{
"ID": "CVE-2020-36694",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694",
"Impact": "Low",
"Public": "20230521"
},
{
"ID": "CVE-2020-4788",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788",
"Impact": "Low",
"Public": "20201120"
},
{
"ID": "CVE-2021-3411",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3411",
"Impact": "Low",
"Public": "20210309"
},
{
"ID": "CVE-2023-0240",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240",
"Impact": "High",
"Public": "20230130"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20203536001",
"Comment": "kernel-doc-un is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536003",
"Comment": "kernel-headers-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536004",
"Comment": "kernel-image-domU-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536005",
"Comment": "kernel-image-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536006",
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536007",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536008",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536009",
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536010",
"Comment": "kernel-modules-ide-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.10.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203536012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:5.10.0-alt1"
}
]
}
]
}
}
]
}