vuln-list-alt/oval/p11/ALT-PU-2020-1421/definitions.json
2024-12-19 09:06:29 +00:00

2882 lines
161 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20201421",
"Version": "oval:org.altlinux.errata:def:20201421",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-1421: package `kernel-image-rpi-un` update to version 5.5.5-alt0.2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-1421",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1421",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-03219",
"RefURL": "https://bdu.fstec.ru/vul/2019-03219",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03507",
"RefURL": "https://bdu.fstec.ru/vul/2019-03507",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03812",
"RefURL": "https://bdu.fstec.ru/vul/2019-03812",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04509",
"RefURL": "https://bdu.fstec.ru/vul/2019-04509",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04510",
"RefURL": "https://bdu.fstec.ru/vul/2019-04510",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04511",
"RefURL": "https://bdu.fstec.ru/vul/2019-04511",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04512",
"RefURL": "https://bdu.fstec.ru/vul/2019-04512",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04513",
"RefURL": "https://bdu.fstec.ru/vul/2019-04513",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04514",
"RefURL": "https://bdu.fstec.ru/vul/2019-04514",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04518",
"RefURL": "https://bdu.fstec.ru/vul/2019-04518",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04658",
"RefURL": "https://bdu.fstec.ru/vul/2019-04658",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04659",
"RefURL": "https://bdu.fstec.ru/vul/2019-04659",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04660",
"RefURL": "https://bdu.fstec.ru/vul/2019-04660",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04661",
"RefURL": "https://bdu.fstec.ru/vul/2019-04661",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04662",
"RefURL": "https://bdu.fstec.ru/vul/2019-04662",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04663",
"RefURL": "https://bdu.fstec.ru/vul/2019-04663",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04664",
"RefURL": "https://bdu.fstec.ru/vul/2019-04664",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04665",
"RefURL": "https://bdu.fstec.ru/vul/2019-04665",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04666",
"RefURL": "https://bdu.fstec.ru/vul/2019-04666",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04669",
"RefURL": "https://bdu.fstec.ru/vul/2019-04669",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04744",
"RefURL": "https://bdu.fstec.ru/vul/2019-04744",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04788",
"RefURL": "https://bdu.fstec.ru/vul/2019-04788",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04798",
"RefURL": "https://bdu.fstec.ru/vul/2019-04798",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04799",
"RefURL": "https://bdu.fstec.ru/vul/2019-04799",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04801",
"RefURL": "https://bdu.fstec.ru/vul/2019-04801",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04802",
"RefURL": "https://bdu.fstec.ru/vul/2019-04802",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04803",
"RefURL": "https://bdu.fstec.ru/vul/2019-04803",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04804",
"RefURL": "https://bdu.fstec.ru/vul/2019-04804",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04805",
"RefURL": "https://bdu.fstec.ru/vul/2019-04805",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04806",
"RefURL": "https://bdu.fstec.ru/vul/2019-04806",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04807",
"RefURL": "https://bdu.fstec.ru/vul/2019-04807",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04808",
"RefURL": "https://bdu.fstec.ru/vul/2019-04808",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04809",
"RefURL": "https://bdu.fstec.ru/vul/2019-04809",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04810",
"RefURL": "https://bdu.fstec.ru/vul/2019-04810",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04811",
"RefURL": "https://bdu.fstec.ru/vul/2019-04811",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04812",
"RefURL": "https://bdu.fstec.ru/vul/2019-04812",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04828",
"RefURL": "https://bdu.fstec.ru/vul/2019-04828",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04829",
"RefURL": "https://bdu.fstec.ru/vul/2019-04829",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04830",
"RefURL": "https://bdu.fstec.ru/vul/2019-04830",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04833",
"RefURL": "https://bdu.fstec.ru/vul/2019-04833",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04854",
"RefURL": "https://bdu.fstec.ru/vul/2019-04854",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04855",
"RefURL": "https://bdu.fstec.ru/vul/2019-04855",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04856",
"RefURL": "https://bdu.fstec.ru/vul/2019-04856",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04892",
"RefURL": "https://bdu.fstec.ru/vul/2019-04892",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00078",
"RefURL": "https://bdu.fstec.ru/vul/2020-00078",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00118",
"RefURL": "https://bdu.fstec.ru/vul/2020-00118",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00119",
"RefURL": "https://bdu.fstec.ru/vul/2020-00119",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00122",
"RefURL": "https://bdu.fstec.ru/vul/2020-00122",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00156",
"RefURL": "https://bdu.fstec.ru/vul/2020-00156",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00157",
"RefURL": "https://bdu.fstec.ru/vul/2020-00157",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00158",
"RefURL": "https://bdu.fstec.ru/vul/2020-00158",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00159",
"RefURL": "https://bdu.fstec.ru/vul/2020-00159",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00160",
"RefURL": "https://bdu.fstec.ru/vul/2020-00160",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00195",
"RefURL": "https://bdu.fstec.ru/vul/2020-00195",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00233",
"RefURL": "https://bdu.fstec.ru/vul/2020-00233",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00284",
"RefURL": "https://bdu.fstec.ru/vul/2020-00284",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00287",
"RefURL": "https://bdu.fstec.ru/vul/2020-00287",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00288",
"RefURL": "https://bdu.fstec.ru/vul/2020-00288",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00290",
"RefURL": "https://bdu.fstec.ru/vul/2020-00290",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00292",
"RefURL": "https://bdu.fstec.ru/vul/2020-00292",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00293",
"RefURL": "https://bdu.fstec.ru/vul/2020-00293",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00296",
"RefURL": "https://bdu.fstec.ru/vul/2020-00296",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00299",
"RefURL": "https://bdu.fstec.ru/vul/2020-00299",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00338",
"RefURL": "https://bdu.fstec.ru/vul/2020-00338",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00349",
"RefURL": "https://bdu.fstec.ru/vul/2020-00349",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00350",
"RefURL": "https://bdu.fstec.ru/vul/2020-00350",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00356",
"RefURL": "https://bdu.fstec.ru/vul/2020-00356",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00362",
"RefURL": "https://bdu.fstec.ru/vul/2020-00362",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00369",
"RefURL": "https://bdu.fstec.ru/vul/2020-00369",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00785",
"RefURL": "https://bdu.fstec.ru/vul/2020-00785",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00786",
"RefURL": "https://bdu.fstec.ru/vul/2020-00786",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00787",
"RefURL": "https://bdu.fstec.ru/vul/2020-00787",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00850",
"RefURL": "https://bdu.fstec.ru/vul/2020-00850",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00853",
"RefURL": "https://bdu.fstec.ru/vul/2020-00853",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00854",
"RefURL": "https://bdu.fstec.ru/vul/2020-00854",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01073",
"RefURL": "https://bdu.fstec.ru/vul/2020-01073",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01074",
"RefURL": "https://bdu.fstec.ru/vul/2020-01074",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01564",
"RefURL": "https://bdu.fstec.ru/vul/2020-01564",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01796",
"RefURL": "https://bdu.fstec.ru/vul/2020-01796",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02140",
"RefURL": "https://bdu.fstec.ru/vul/2020-02140",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02158",
"RefURL": "https://bdu.fstec.ru/vul/2020-02158",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02159",
"RefURL": "https://bdu.fstec.ru/vul/2020-02159",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02161",
"RefURL": "https://bdu.fstec.ru/vul/2020-02161",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02429",
"RefURL": "https://bdu.fstec.ru/vul/2020-02429",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02944",
"RefURL": "https://bdu.fstec.ru/vul/2020-02944",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03026",
"RefURL": "https://bdu.fstec.ru/vul/2020-03026",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03360",
"RefURL": "https://bdu.fstec.ru/vul/2020-03360",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03361",
"RefURL": "https://bdu.fstec.ru/vul/2020-03361",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03830",
"RefURL": "https://bdu.fstec.ru/vul/2020-03830",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05893",
"RefURL": "https://bdu.fstec.ru/vul/2020-05893",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02590",
"RefURL": "https://bdu.fstec.ru/vul/2021-02590",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03056",
"RefURL": "https://bdu.fstec.ru/vul/2021-03056",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03596",
"RefURL": "https://bdu.fstec.ru/vul/2021-03596",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04836",
"RefURL": "https://bdu.fstec.ru/vul/2021-04836",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04847",
"RefURL": "https://bdu.fstec.ru/vul/2021-04847",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04865",
"RefURL": "https://bdu.fstec.ru/vul/2021-04865",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05741",
"RefURL": "https://bdu.fstec.ru/vul/2021-05741",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05889",
"RefURL": "https://bdu.fstec.ru/vul/2022-05889",
"Source": "BDU"
},
{
"RefID": "CVE-2019-10207",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10220",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10220",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14895",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14895",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14896",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14896",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14897",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14897",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14901",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15099",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16746",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16746",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17133",
"Source": "CVE"
},
{
"RefID": "CVE-2019-17666",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18282",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18660",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18660",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18683",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18683",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18786",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18808",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18809",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18810",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18810",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18811",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18812",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18812",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18813",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18813",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18814",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18814",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19036",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19036",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19037",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19037",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19039",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19039",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19043",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19043",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19044",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19044",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19045",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19046",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19047",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19048",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19048",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19049",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19049",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19050",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19050",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19051",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19051",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19052",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19052",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19053",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19053",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19054",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19054",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19055",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19056",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19057",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19058",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19059",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19060",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19060",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19061",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19061",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19062",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19063",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19064",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19064",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19065",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19066",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19066",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19067",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19068",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19069",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19069",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19070",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19070",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19071",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19071",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19072",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19073",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19074",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19075",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19075",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19076",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19076",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19077",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19078",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19078",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19082",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19082",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19083",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19083",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19241",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19241",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19252",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19252",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19332",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19338",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19338",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19462",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19462",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19523",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19524",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19525",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19525",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19526",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19526",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19528",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19529",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19529",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19532",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19534",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19602",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19767",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19769",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19769",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19807",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19807",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19922",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19947",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19947",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19965",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19965",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20636",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20812",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20908",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20908",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10690",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12652",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12652",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12653",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12654",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12769",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12769",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14416",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14416",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25673",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25673",
"Source": "CVE"
},
{
"RefID": "CVE-2020-8428",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8428",
"Source": "CVE"
},
{
"RefID": "CVE-2020-8647",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647",
"Source": "CVE"
},
{
"RefID": "CVE-2020-8648",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"Source": "CVE"
},
{
"RefID": "CVE-2020-8649",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649",
"Source": "CVE"
},
{
"RefID": "CVE-2020-8992",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8992",
"Source": "CVE"
},
{
"RefID": "CVE-2021-20177",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20177",
"Source": "CVE"
},
{
"RefID": "CVE-2021-20239",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"Source": "CVE"
},
{
"RefID": "CVE-2021-20317",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20317",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3635",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"Source": "CVE"
},
{
"RefID": "CVE-2021-43056",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rpi-un to version 5.5.5-alt0.2. \nSecurity Fix(es):\n\n * BDU:2019-03219: Уязвимость драйвера drivers/net/wireless/ath/ath10k/usb.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03507: Уязвимость компонента net/wireless/nl80211.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03812: Уязвимость функции rtl_p2p_noa_ie из drivers/net/wireless/realtek/rtlwifi/ps.c ядра операционной системы Linux, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-04509: Уязвимость функции sof_set_get_large_ctrl_data() (sound/soc/sof/ipc.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04510: Уязвимость функции af9005_identify_state() (drivers/media/usb/dvb-usb/af9005.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04511: Уязвимость функции ccp_run_sha_cmd() (drivers/crypto/ccp/ccp-ops.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04512: Уязвимость функции aa_audit_rule_init() (security/apparmor/audit.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04513: Уязвимость функции komeda_wb_connector_add() (drivers/gpu/drm/arm/display/komeda/komeda_wb_connector.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04514: Уязвимость функции sof_dfsentry_write() (sound/soc/sof/debug.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04518: Уязвимость функции dwc3_pci_probe() (drivers/usb/dwc3/dwc3-pci.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04658: Уязвимость функции crypto_reportstat() (crypto/crypto_user_stat.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04659: Уязвимость функции v3d_submit_cl_ioctl() (drivers/gpu/drm/v3d/v3d_gem.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04660: Уязвимость функции mlx5_fpga_conn_create_cq() (drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04661: Уязвимость функции gs_can_open() (drivers/net/can/usb/gs_usb.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04662: Уязвимость функции mwifiex_pcie_alloc_cmdrsp_buf() (drivers/net/wireless/marvell/mwifiex/pcie.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04663: Уязвимость функции rpmsg_eptdev_write_iter() (drivers/rpmsg/rpmsg_char.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04664: Уязвимость функции nl80211_get_ftm_responder_stats() (net/wireless/nl80211.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04665: Уязвимость функции i2400m_op_rfkill_sw_toggle() (drivers/net/wimax/i2400m/op-rfkill.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04666: Уязвимость функции cx23888_ir_probe() (drivers/media/pci/cx23885/cx23888-ir.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04669: Уязвимость функции unittest_data_add() (drivers/of/unittest.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04744: Уязвимость драйверов drivers/bluetooth/hci_ath.c, drivers/bluetooth/hci_bcm.c, drivers/bluetooth/hci_intel.c, drivers/bluetooth/hci_ldisc.c, drivers/bluetooth/hci_mrvl.c, drivers/bluetooth/hci_qca.c, drivers/bluetooth/hci_uart.h для UART-подключаемых адаптеров Bluetooth ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04788: Уязвимость функции из marvell/mwifiex/tdls.c драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-04798: Уязвимость функции add_ie_rates (drivers/net/wireless/marvell/libertas/cfg.c) драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-04799: Уязвимость функции mwifiex_process_country_ie() (drivers/net/wireless/marvell/mwifiex/sta_ioctl.c) драйвера Marvell WiFi ядра операционной системы Linux, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-04801: Уязвимость функции rtl_usb_probe() (drivers/net/wireless/realtek/rtlwifi/usb.c ) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04802: Уязвимость функции crypto_report() (crypto/crypto_user_base.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04803: Уязвимость функции acp_hw_init() (drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04804: Уязвимость функции spi_gpio_probe() (drivers/spi/spi-gpio.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04805: Уязвимость функции rsi_send_beacon() (drivers/net/wireless/rsi/rsi_91x_mgmt.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04806: Уязвимость функции alloc_sgtable() (drivers/net/wireless/intel/iwlwifi/fw/dbg.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04807: Уязвимость функции mwifiex_pcie_init_evt_ring() (drivers/net/wireless/marvell/mwifiex/pcie.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04808: Уязвимость функции fastrpc_dma_buf_attach() (drivers/misc/fastrpc.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04809: Уязвимость функции bfad_im_get_stats() (drivers/scsi/bfa/bfad_attr.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04810: Уязвимость функции rtl8xxxu_submit_int_urb() (drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04811: Уязвимость функции iwl_pcie_ctxt_info_gen3_init() (drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04812: Уязвимость функции adis_update_scan_mode_burst() (drivers/iio/imu/adis_buffer.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04828: Уязвимость функции fsl_lpspi_probe() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04829: Уязвимость функции adis_update_scan_mode() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04830: Уязвимость функции sdma_init() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04833: Уязвимость драйверов drivers/net/wireless/ath/ath9k/htc_hst.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04854: Уязвимость функции __btrfs_free_extent (fs/btrfs/extent-tree.c) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04855: Уязвимость функции ext4_empty_dir (fs/ext4/namei.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04856: Уязвимость функции btrfs_root_node (fs/btrfs/ctree.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04892: Уязвимость драйвера drivers/net/wireless/ath/ath9k/htc_hst.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00078: Уязвимость функции cfg80211_mgd_wext_giwessid (net/wireless/wext-sme.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2020-00118: Уязвимость функции clock_source_create() (/gpu /drm/amd/display/dc) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00119: Уязвимость функции create_resource_pool() (drivers/gpu/drm/amd/display/dc) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00122: Уязвимость функции rcar_drif_g_fmt_sdr_cap (drivers/media/platform/rcar_drif.c) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-00156: Уязвимость функции ath10k_usb_hif_tx_sg из drivers/net/wireless/ath/ath10k/usb.c ядра операционной системы Linux, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00157: Уязвимость функции bnxt_re_create_srq() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00158: Уязвимость функции nfp_abm_u32_knode_replace() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00159: Уязвимость функции ca8210_probe() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00160: Уязвимость функции predicate_parse() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00195: Уязвимость драйвера дисплея (drivers/media/platform/vivid) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00233: Уязвимость SMB-клиента ядра операционной системы Linux, позволяющая нарушителю манипулировать файлами в каталоге клиента\n\n * BDU:2020-00284: Уязвимость функции vcs_write (drivers/tty/vt/vc_screen.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2020-00287: Уязвимость драйвера drivers/usb/misc/iowarrior.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00288: Уязвимость драйвера drivers/net/ieee802154/atusb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00290: Уязвимость драйвера drivers/input/ff-memless.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00292: Уязвимость драйвера drivers/usb/misc/adutux.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00293: Уязвимость драйвера drivers/net/can/usb/mcba_usb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00296: Уязвимость драйвера drivers/net/can/usb/peak_usb/pcan_usb_core.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-00299: Уязвимость драйвера drivers/nfc/pn533/usb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00338: Уязвимость функции perf_trace_lock_acquire ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00349: Уязвимость функции cpu.cfs_quota_us ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00350: Уязвимость компонента drivers/scsi/libsas/sas_discover.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00356: Уязвимость ядра операционных систем Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-00362: Уязвимость функции flow_dissector ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-00369: Уязвимость драйверов HID ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-00785: Уязвимость функции vc_do_resize ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2020-00786: Уязвимость функции vgacon_invert_region ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2020-00787: Уязвимость функции n_tty_receive_buf_common ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2020-00850: Уязвимость функции fs/namei.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00853: Уязвимость функции io_uring ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2020-00854: Уязвимость функций snd_timer_open и snd_timer_close_locked ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2020-01073: Уязвимость функции ext4_protect_reserved_inode (fs/ext4/block_validity.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01074: Уязвимость функции fpregs_state_valid (arch/x86/include/asm/fpu/internal.h) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании\n\n * BDU:2020-01564: Уязвимость функции the__ipmi_bmc_register() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01796: Уязвимость функции lbs_ibss_join_existing (drivers/net/wireless/marvell/libertas/cfg.c) драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-02140: Уязвимость функции mptctl_ioctl (drivers/message/fusion/mptctl.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02158: Уязвимость функции «mlx5_fw_fatal_reporter_dump()» в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02159: Уязвимость функции « i40e_setup_macvlans» в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02161: Уязвимость функции «crypto_reportstat()» в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02429: Уязвимость компонента drivers/spi/spi-dw.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02944: Уязвимость компонентов arch/powerpc/kernel/entry_64.S и arch/powerpc/kernel/security.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-03026: Уязвимость функции prb_calc_retire_blk_tmo() (net/packet/af_packet.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03360: Уязвимость функции mwifiex_cmd_append_vsie_tlv() драйвера Marvell WiFi ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2020-03361: Уязвимость функции mwifiex_ret_wmm_get_status() драйвера Marvell WiFi ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03830: Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05893: Уязвимость запроса гипервизора KVM KVM_GET_EMULATED_CPUID ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании\n\n * BDU:2021-02590: Уязвимость драйвера drivers/firmware/efi/efi.c ядра операционной системы Linux, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2021-03056: Уязвимость компонента drivers/input/input.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-03596: Уязвимость функции relay_open из kernel/relay.c ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04836: Уязвимость ядра операционной системы Linux , связанная с раскрытием защищаемой информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-04847: Уязвимость реализации netfilter ядра операционной системы Linux вызвана переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04865: Уязвимость ядра операционной системы Linux , связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05741: Уязвимость реализации файла исходного кода arch/powerpc/kvm/book3s_hv_rmhandlers.S ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05889: Уязвимость функции timerqueue_add компонента lib/timerqueue.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-10207: A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.\n\n * CVE-2019-10220: Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.\n\n * CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.\n\n * CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.\n\n * CVE-2019-14897: A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.\n\n * CVE-2019-14901: A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.\n\n * CVE-2019-15099: drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.\n\n * CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.\n\n * CVE-2019-17133: In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.\n\n * CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.\n\n * CVE-2019-18282: The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.\n\n * CVE-2019-18660: The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.\n\n * CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.\n\n * CVE-2019-18786: In the Linux kernel through 5.3.8, f-\u003efmt.sdr.reserved is uninitialized in rcar_drif_g_fmt_sdr_cap in drivers/media/platform/rcar_drif.c, which could cause a memory disclosure problem.\n\n * CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.\n\n * CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.\n\n * CVE-2019-18810: A memory leak in the komeda_wb_connector_add() function in drivers/gpu/drm/arm/display/komeda/komeda_wb_connector.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering drm_writeback_connector_init() failures, aka CID-a0ecd6fdbf5d.\n\n * CVE-2019-18811: A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.\n\n * CVE-2019-18812: A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.\n\n * CVE-2019-18813: A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.\n\n * CVE-2019-18814: An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.\n\n * CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.\n\n * CVE-2019-19037: ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.\n\n * CVE-2019-19039: __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.\n\n * CVE-2019-19043: A memory leak in the i40e_setup_macvlans() function in drivers/net/ethernet/intel/i40e/i40e_main.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering i40e_setup_channel() failures, aka CID-27d461333459.\n\n * CVE-2019-19044: Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.\n\n * CVE-2019-19045: A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.\n\n * CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time\n\n * CVE-2019-19047: A memory leak in the mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_crdump_collect() failures, aka CID-c7ed6d0183d5.\n\n * CVE-2019-19048: A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864.\n\n * CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot\n\n * CVE-2019-19050: A memory leak in the crypto_reportstat() function in crypto/crypto_user_stat.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_reportstat_alg() failures, aka CID-c03b04dcdba1.\n\n * CVE-2019-19051: A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.\n\n * CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.\n\n * CVE-2019-19053: A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.\n\n * CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.\n\n * CVE-2019-19055: A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred\n\n * CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.\n\n * CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.\n\n * CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.\n\n * CVE-2019-19059: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering iwl_pcie_init_fw_sec() or dma_alloc_coherent() failures, aka CID-0f4f199443fa.\n\n * CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.\n\n * CVE-2019-19061: A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.\n\n * CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.\n\n * CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.\n\n * CVE-2019-19064: A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control these failures at probe time\n\n * CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\n\n * CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.\n\n * CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading\n\n * CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.\n\n * CVE-2019-19069: A memory leak in the fastrpc_dma_buf_attach() function in drivers/misc/fastrpc.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering dma_get_sgtable() failures, aka CID-fc739a058d99.\n\n * CVE-2019-19070: A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began\n\n * CVE-2019-19071: A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.\n\n * CVE-2019-19072: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.\n\n * CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.\n\n * CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n\n * CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.\n\n * CVE-2019-19076: A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted\n\n * CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.\n\n * CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.\n\n * CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.\n\n * CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.\n\n * CVE-2019-19241: In the Linux kernel before 5.4.2, the io_uring feature leads to requests that inadvertently have UID 0 and full capabilities, aka CID-181e448d8709. This is related to fs/io-wq.c, fs/io_uring.c, and net/socket.c. For example, an attacker can bypass intended restrictions on adding an IPv4 address to the loopback interface. This occurs because IORING_OP_SENDMSG operations, although requested in the context of an unprivileged user, are sometimes performed by a kernel worker thread without considering that context.\n\n * CVE-2019-19252: vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.\n\n * CVE-2019-19332: An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.\n\n * CVE-2019-19338: A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.\n\n * CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.\n\n * CVE-2019-19523: In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.\n\n * CVE-2019-19524: In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.\n\n * CVE-2019-19525: In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.\n\n * CVE-2019-19526: In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.\n\n * CVE-2019-19528: In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.\n\n * CVE-2019-19529: In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.\n\n * CVE-2019-19532: In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.\n\n * CVE-2019-19534: In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.\n\n * CVE-2019-19602: fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.\n\n * CVE-2019-19767: The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.\n\n * CVE-2019-19769: In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).\n\n * CVE-2019-19807: In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for a different purpose after refactoring.\n\n * CVE-2019-19922: kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)\n\n * CVE-2019-19947: In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c.\n\n * CVE-2019-19965: In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.\n\n * CVE-2019-20636: In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.\n\n * CVE-2019-20812: An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.\n\n * CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.\n\n * CVE-2020-10690: There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.\n\n * CVE-2020-12652: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"\n\n * CVE-2020-12653: An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.\n\n * CVE-2020-12654: An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.\n\n * CVE-2020-12769: An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.\n\n * CVE-2020-14416: In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.\n\n * CVE-2020-25673: A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.\n\n * CVE-2020-8428: fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.\n\n * CVE-2020-8647: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.\n\n * CVE-2020-8648: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.\n\n * CVE-2020-8649: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.\n\n * CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.\n\n * CVE-2021-20177: A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.\n\n * CVE-2021-20239: A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.\n\n * CVE-2021-20317: A flaw was found in the Linux kernel. A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP.\n\n * CVE-2021-3635: A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.\n\n * CVE-2021-43056: An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-03-04"
},
"Updated": {
"Date": "2020-03-04"
},
"BDUs": [
{
"ID": "BDU:2019-03219",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-03219",
"Impact": "High",
"Public": "20190814"
},
{
"ID": "BDU:2019-03507",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-03507",
"Impact": "Critical",
"Public": "20190923"
},
{
"ID": "BDU:2019-03812",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-03812",
"Impact": "High",
"Public": "20191015"
},
{
"ID": "BDU:2019-04509",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04509",
"Impact": "Low",
"Public": "20191028"
},
{
"ID": "BDU:2019-04510",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04510",
"Impact": "Low",
"Public": "20191024"
},
{
"ID": "BDU:2019-04511",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04511",
"Impact": "Low",
"Public": "20191005"
},
{
"ID": "BDU:2019-04512",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04512",
"Impact": "Critical",
"Public": "20191106"
},
{
"ID": "BDU:2019-04513",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04513",
"Impact": "High",
"Public": "20190927"
},
{
"ID": "BDU:2019-04514",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04514",
"Impact": "High",
"Public": "20191028"
},
{
"ID": "BDU:2019-04518",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04518",
"Impact": "High",
"Public": "20191027"
},
{
"ID": "BDU:2019-04658",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04658",
"Impact": "High",
"Public": "20191010"
},
{
"ID": "BDU:2019-04659",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04659",
"Impact": "High",
"Public": "20191023"
},
{
"ID": "BDU:2019-04660",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04660",
"Impact": "High",
"Public": "20191018"
},
{
"ID": "BDU:2019-04661",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04661",
"Impact": "High",
"Public": "20191104"
},
{
"ID": "BDU:2019-04662",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04662",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "BDU:2019-04663",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04663",
"Impact": "High",
"Public": "20191004"
},
{
"ID": "BDU:2019-04664",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04664",
"Impact": "Low",
"Public": "20191007"
},
{
"ID": "BDU:2019-04665",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04665",
"Impact": "Low",
"Public": "20190911"
},
{
"ID": "BDU:2019-04666",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04666",
"Impact": "Low",
"Public": "20191007"
},
{
"ID": "BDU:2019-04669",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04669",
"Impact": "High",
"Public": "20191023"
},
{
"ID": "BDU:2019-04744",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-04744",
"Impact": "Low",
"Public": "20190729"
},
{
"ID": "BDU:2019-04788",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-400, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04788",
"Impact": "Critical",
"Public": "20191128"
},
{
"ID": "BDU:2019-04798",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04798",
"Impact": "Critical",
"Public": "20191126"
},
{
"ID": "BDU:2019-04799",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04799",
"Impact": "Critical",
"Public": "20191128"
},
{
"ID": "BDU:2019-04801",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04801",
"Impact": "Low",
"Public": "20191001"
},
{
"ID": "BDU:2019-04802",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04802",
"Impact": "Low",
"Public": "20191010"
},
{
"ID": "BDU:2019-04803",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04803",
"Impact": "High",
"Public": "20191002"
},
{
"ID": "BDU:2019-04804",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04804",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "BDU:2019-04805",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04805",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "BDU:2019-04806",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04806",
"Impact": "High",
"Public": "20191009"
},
{
"ID": "BDU:2019-04807",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04807",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "BDU:2019-04808",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04808",
"Impact": "High",
"Public": "20191004"
},
{
"ID": "BDU:2019-04809",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04809",
"Impact": "Low",
"Public": "20190930"
},
{
"ID": "BDU:2019-04810",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04810",
"Impact": "Low",
"Public": "20191002"
},
{
"ID": "BDU:2019-04811",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04811",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "BDU:2019-04812",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04812",
"Impact": "High",
"Public": "20191009"
},
{
"ID": "BDU:2019-04828",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04828",
"Impact": "High",
"Public": "20191001"
},
{
"ID": "BDU:2019-04829",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04829",
"Impact": "High",
"Public": "20191009"
},
{
"ID": "BDU:2019-04830",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04830",
"Impact": "Low",
"Public": "20191001"
},
{
"ID": "BDU:2019-04833",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04833",
"Impact": "Low",
"Public": "20190910"
},
{
"ID": "BDU:2019-04854",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-532",
"Href": "https://bdu.fstec.ru/vul/2019-04854",
"Impact": "Low",
"Public": "20191119"
},
{
"ID": "BDU:2019-04855",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-04855",
"Impact": "Low",
"Public": "20191120"
},
{
"ID": "BDU:2019-04856",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-04856",
"Impact": "Low",
"Public": "20190909"
},
{
"ID": "BDU:2019-04892",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2019-04892",
"Impact": "High",
"Public": "20190910"
},
{
"ID": "BDU:2020-00078",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2020-00078",
"Impact": "Critical",
"Public": "20191003"
},
{
"ID": "BDU:2020-00118",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00118",
"Impact": "Low",
"Public": "20191002"
},
{
"ID": "BDU:2020-00119",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00119",
"Impact": "Low",
"Public": "20190925"
},
{
"ID": "BDU:2020-00122",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2020-00122",
"Impact": "Low",
"Public": "20191105"
},
{
"ID": "BDU:2020-00156",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00156",
"Impact": "High",
"Public": "20190923"
},
{
"ID": "BDU:2020-00157",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00157",
"Impact": "Low",
"Public": "20190913"
},
{
"ID": "BDU:2020-00158",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00158",
"Impact": "Low",
"Public": "20190927"
},
{
"ID": "BDU:2020-00159",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00159",
"Impact": "High",
"Public": "20190927"
},
{
"ID": "BDU:2020-00160",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-00160",
"Impact": "Low",
"Public": "20190928"
},
{
"ID": "BDU:2020-00195",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00195",
"Impact": "High",
"Public": "20191103"
},
{
"ID": "BDU:2020-00233",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2020-00233",
"Impact": "High",
"Public": "20191005"
},
{
"ID": "BDU:2020-00284",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-00284",
"Impact": "High",
"Public": "20191124"
},
{
"ID": "BDU:2020-00287",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00287",
"Impact": "Low",
"Public": "20191010"
},
{
"ID": "BDU:2020-00288",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00288",
"Impact": "Low",
"Public": "20190919"
},
{
"ID": "BDU:2020-00290",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00290",
"Impact": "Low",
"Public": "20191115"
},
{
"ID": "BDU:2020-00292",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00292",
"Impact": "Low",
"Public": "20191004"
},
{
"ID": "BDU:2020-00293",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00293",
"Impact": "Low",
"Public": "20191104"
},
{
"ID": "BDU:2020-00296",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200, CWE-909",
"Href": "https://bdu.fstec.ru/vul/2020-00296",
"Impact": "Low",
"Public": "20191104"
},
{
"ID": "BDU:2020-00299",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00299",
"Impact": "Low",
"Public": "20191008"
},
{
"ID": "BDU:2020-00338",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00338",
"Impact": "Low",
"Public": "20191211"
},
{
"ID": "BDU:2020-00349",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2020-00349",
"Impact": "Low",
"Public": "20190808"
},
{
"ID": "BDU:2020-00350",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-00350",
"Impact": "Low",
"Public": "20191209"
},
{
"ID": "BDU:2020-00356",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2020-00356",
"Impact": "Low",
"Public": "20191208"
},
{
"ID": "BDU:2020-00362",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-328, CWE-330",
"Href": "https://bdu.fstec.ru/vul/2020-00362",
"Impact": "Low",
"Public": "20191023"
},
{
"ID": "BDU:2020-00369",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-00369",
"Impact": "Low",
"Public": "20191003"
},
{
"ID": "BDU:2020-00785",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00785",
"Impact": "High",
"Public": "20200204"
},
{
"ID": "BDU:2020-00786",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00786",
"Impact": "High",
"Public": "20200204"
},
{
"ID": "BDU:2020-00787",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00787",
"Impact": "High",
"Public": "20200204"
},
{
"ID": "BDU:2020-00850",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00850",
"Impact": "High",
"Public": "20200126"
},
{
"ID": "BDU:2020-00853",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2020-00853",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-00854",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00854",
"Impact": "High",
"Public": "20191106"
},
{
"ID": "BDU:2020-01073",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-834",
"Href": "https://bdu.fstec.ru/vul/2020-01073",
"Impact": "Low",
"Public": "20200213"
},
{
"ID": "BDU:2020-01074",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-362, CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01074",
"Impact": "High",
"Public": "20191128"
},
{
"ID": "BDU:2020-01564",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-01564",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01796",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-121, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01796",
"Impact": "Critical",
"Public": "20191128"
},
{
"ID": "BDU:2020-02140",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-02140",
"Impact": "Low",
"Public": "20200115"
},
{
"ID": "BDU:2020-02158",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-02158",
"Impact": "Low",
"Public": "20191018"
},
{
"ID": "BDU:2020-02159",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-02159",
"Impact": "Low",
"Public": "20191025"
},
{
"ID": "BDU:2020-02161",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2020-02161",
"Impact": "High",
"Public": "20191010"
},
{
"ID": "BDU:2020-02429",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-662",
"Href": "https://bdu.fstec.ru/vul/2020-02429",
"Impact": "Low",
"Public": "20200103"
},
{
"ID": "BDU:2020-02944",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-02944",
"Impact": "Low",
"Public": "20191114"
},
{
"ID": "BDU:2020-03026",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2020-03026",
"Impact": "Low",
"Public": "20191209"
},
{
"ID": "BDU:2020-03360",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120, CWE-269, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03360",
"Impact": "High",
"Public": "20200127"
},
{
"ID": "BDU:2020-03361",
"CVSS": "AV:A/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03361",
"Impact": "High",
"Public": "20200127"
},
{
"ID": "BDU:2020-03830",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03830",
"Impact": "Low",
"Public": "20200122"
},
{
"ID": "BDU:2020-05893",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-05893",
"Impact": "Low",
"Public": "20191204"
},
{
"ID": "BDU:2021-02590",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2021-02590",
"Impact": "Low",
"Public": "20190819"
},
{
"ID": "BDU:2021-03056",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-03056",
"Impact": "Low",
"Public": "20191213"
},
{
"ID": "BDU:2021-03596",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-03596",
"Impact": "Low",
"Public": "20191128"
},
{
"ID": "BDU:2021-04836",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-119, CWE-200, CWE-822",
"Href": "https://bdu.fstec.ru/vul/2021-04836",
"Impact": "Low",
"Public": "20210528"
},
{
"ID": "BDU:2021-04847",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04847",
"Impact": "Low",
"Public": "20200116"
},
{
"ID": "BDU:2021-04865",
"CVSS": "AV:L/AC:L/Au:M/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-04865",
"Impact": "Low",
"Public": "20210526"
},
{
"ID": "BDU:2021-05741",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-252",
"Href": "https://bdu.fstec.ru/vul/2021-05741",
"Impact": "Low",
"Public": "20211015"
},
{
"ID": "BDU:2022-05889",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-665",
"Href": "https://bdu.fstec.ru/vul/2022-05889",
"Impact": "Low",
"Public": "20190724"
}
],
"CVEs": [
{
"ID": "CVE-2019-10207",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-10220",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10220",
"Impact": "High",
"Public": "20191127"
},
{
"ID": "CVE-2019-14895",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14895",
"Impact": "Critical",
"Public": "20191129"
},
{
"ID": "CVE-2019-14896",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14896",
"Impact": "Critical",
"Public": "20191127"
},
{
"ID": "CVE-2019-14897",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14897",
"Impact": "Critical",
"Public": "20191129"
},
{
"ID": "CVE-2019-14901",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
"Impact": "Critical",
"Public": "20191129"
},
{
"ID": "CVE-2019-15099",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099",
"Impact": "High",
"Public": "20190816"
},
{
"ID": "CVE-2019-16746",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16746",
"Impact": "Critical",
"Public": "20190924"
},
{
"ID": "CVE-2019-17133",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17133",
"Impact": "Critical",
"Public": "20191004"
},
{
"ID": "CVE-2019-17666",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666",
"Impact": "High",
"Public": "20191017"
},
{
"ID": "CVE-2019-18282",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282",
"Impact": "Low",
"Public": "20200116"
},
{
"ID": "CVE-2019-18660",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18660",
"Impact": "Low",
"Public": "20191127"
},
{
"ID": "CVE-2019-18683",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18683",
"Impact": "High",
"Public": "20191104"
},
{
"ID": "CVE-2019-18786",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18786",
"Impact": "Low",
"Public": "20191106"
},
{
"ID": "CVE-2019-18808",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
"Impact": "Low",
"Public": "20191107"
},
{
"ID": "CVE-2019-18809",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
"Impact": "Low",
"Public": "20191107"
},
{
"ID": "CVE-2019-18810",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18810",
"Impact": "High",
"Public": "20191107"
},
{
"ID": "CVE-2019-18811",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811",
"Impact": "Low",
"Public": "20191107"
},
{
"ID": "CVE-2019-18812",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18812",
"Impact": "High",
"Public": "20191107"
},
{
"ID": "CVE-2019-18813",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18813",
"Impact": "High",
"Public": "20191107"
},
{
"ID": "CVE-2019-18814",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18814",
"Impact": "Critical",
"Public": "20191107"
},
{
"ID": "CVE-2019-19036",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19036",
"Impact": "Low",
"Public": "20191121"
},
{
"ID": "CVE-2019-19037",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19037",
"Impact": "Low",
"Public": "20191121"
},
{
"ID": "CVE-2019-19039",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19039",
"Impact": "Low",
"Public": "20191121"
},
{
"ID": "CVE-2019-19043",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19043",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19044",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19044",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19045",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19046",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19047",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19048",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19048",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19049",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19049",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19050",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19050",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19051",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19051",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19052",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19052",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19053",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19053",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19054",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19054",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19055",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19056",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19057",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19058",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19059",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19060",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19060",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19061",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19061",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19062",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19063",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19064",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19064",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19065",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19066",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19066",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19067",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19068",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19069",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19069",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19070",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19070",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19071",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19071",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19072",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19073",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19074",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19075",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19075",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19076",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19076",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19077",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19078",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19078",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "CVE-2019-19082",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19082",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19083",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19083",
"Impact": "Low",
"Public": "20191118"
},
{
"ID": "CVE-2019-19241",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19241",
"Impact": "High",
"Public": "20191217"
},
{
"ID": "CVE-2019-19252",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19252",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-19332",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
"Impact": "Low",
"Public": "20200109"
},
{
"ID": "CVE-2019-19338",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19338",
"Impact": "Low",
"Public": "20200713"
},
{
"ID": "CVE-2019-19462",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19462",
"Impact": "Low",
"Public": "20191130"
},
{
"ID": "CVE-2019-19523",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19524",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19525",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19525",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19526",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19526",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19528",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19529",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19529",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19532",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19534",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534",
"Impact": "Low",
"Public": "20191203"
},
{
"ID": "CVE-2019-19602",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602",
"Impact": "Low",
"Public": "20191205"
},
{
"ID": "CVE-2019-19767",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
"Impact": "Low",
"Public": "20191212"
},
{
"ID": "CVE-2019-19769",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19769",
"Impact": "Low",
"Public": "20191212"
},
{
"ID": "CVE-2019-19807",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19807",
"Impact": "High",
"Public": "20191215"
},
{
"ID": "CVE-2019-19922",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922",
"Impact": "Low",
"Public": "20191222"
},
{
"ID": "CVE-2019-19947",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19947",
"Impact": "Low",
"Public": "20191224"
},
{
"ID": "CVE-2019-19965",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19965",
"Impact": "Low",
"Public": "20191225"
},
{
"ID": "CVE-2019-20636",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
"Impact": "Low",
"Public": "20200408"
},
{
"ID": "CVE-2019-20812",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2019-20908",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20908",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-10690",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690",
"Impact": "Low",
"Public": "20200508"
},
{
"ID": "CVE-2020-12652",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12652",
"Impact": "Low",
"Public": "20200505"
},
{
"ID": "CVE-2020-12653",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653",
"Impact": "High",
"Public": "20200505"
},
{
"ID": "CVE-2020-12654",
"CVSS": "AV:A/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654",
"Impact": "High",
"Public": "20200505"
},
{
"ID": "CVE-2020-12769",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-662",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12769",
"Impact": "Low",
"Public": "20200509"
},
{
"ID": "CVE-2020-14416",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14416",
"Impact": "Low",
"Public": "20200618"
},
{
"ID": "CVE-2020-25673",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25673",
"Impact": "Low",
"Public": "20210526"
},
{
"ID": "CVE-2020-8428",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8428",
"Impact": "High",
"Public": "20200129"
},
{
"ID": "CVE-2020-8647",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647",
"Impact": "Low",
"Public": "20200206"
},
{
"ID": "CVE-2020-8648",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"Impact": "High",
"Public": "20200206"
},
{
"ID": "CVE-2020-8649",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649",
"Impact": "Low",
"Public": "20200206"
},
{
"ID": "CVE-2020-8992",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8992",
"Impact": "Low",
"Public": "20200214"
},
{
"ID": "CVE-2021-20177",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20177",
"Impact": "Low",
"Public": "20210526"
},
{
"ID": "CVE-2021-20239",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"Impact": "Low",
"Public": "20210528"
},
{
"ID": "CVE-2021-20317",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20317",
"Impact": "Low",
"Public": "20210927"
},
{
"ID": "CVE-2021-3635",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"Impact": "Low",
"Public": "20210813"
},
{
"ID": "CVE-2021-43056",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056",
"Impact": "Low",
"Public": "20211028"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20201421001",
"Comment": "kernel-headers-modules-rpi-un is earlier than 1:5.5.5-alt0.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201421002",
"Comment": "kernel-headers-rpi-un is earlier than 1:5.5.5-alt0.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201421003",
"Comment": "kernel-image-rpi-un is earlier than 1:5.5.5-alt0.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201421004",
"Comment": "kernel-modules-staging-rpi-un is earlier than 1:5.5.5-alt0.2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201421005",
"Comment": "kernel-modules-v4l-rpi-un is earlier than 1:5.5.5-alt0.2"
}
]
}
]
}
}
]
}