608 lines
32 KiB
JSON
608 lines
32 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20212486",
|
||
"Version": "oval:org.altlinux.errata:def:20212486",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-2486: package `kernel-image-un-def` update to version 5.13.9-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p11"
|
||
],
|
||
"Products": [
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-2486",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2486",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03233",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03233",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04027",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04027",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04028",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04028",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04561",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04561",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04710",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04710",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04711",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04711",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04840",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04840",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04845",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04845",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04846",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04846",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04848",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04848",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04849",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04849",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04851",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04851",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04852",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04852",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04864",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04864",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05198",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05198",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00595",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00595",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05655",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05655",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-06017",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-06017",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-26558",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26558",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-34556",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-34556",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-35477",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-35477",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3573",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3609",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-37159",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-37576",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38160",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38160",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38166",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38166",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38199",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38199",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38201",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38201",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38202",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38202",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38203",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38203",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38204",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38204",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38205",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38205",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-45485",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36280",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41222",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-un-def to version 5.13.9-alt1. \nSecurity Fix(es):\n\n * BDU:2021-03233: Уязвимость реализации протокола CAN BCM ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-04027: Уязвимость функции hso_free_net_device драйвера /net/usb/hso.c ядра операционной системы Linux, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность\n\n * BDU:2021-04028: Уязвимость функции rtas_args.nargs драйвера arch/powerpc/kvm/book3s_rtas.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение памяти операционной системы хоста\n\n * BDU:2021-04561: Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04710: Уязвимость функции strlen компонента fs/nfsd/trace.h ядра операционной системы Linux, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04711: Уязвимость функции xdr_set_page_base компонента net/sunrpc/xdr.c ядра операционной системы Linux, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04840: Уязвимость ядра операционной системы Linux , связанная с раскрытием информации через несоответствие, позволяющая нарушителю прочитать часть памяти ядра\n\n * BDU:2021-04845: Уязвимость ядра операционной системы Linux , связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2021-04846: Уязвимость функции hci_sock_bound_ioctl () подсистемы HCI ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код в контексте ядра\n\n * BDU:2021-04848: Уязвимость драйвера drivers/char/virtio_console.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение стека\n\n * BDU:2021-04849: Уязвимость компонента kernel/bpf/hashtab.c ядра операционной системы Linux , связанная с записью за границами буфера в памяти, позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность данных\n\n * BDU:2021-04851: Уязвимость компонента drivers/usb/host/max3421-hcd.c ядра операционной системы Linux , связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04852: Уязвимость компонента drivers/net/ethernet/xilinx/xilinx_emaclite.c ядра операционной системы Linux, позволяющая нарушителю взломать механизм защиты ASLR\n\n * BDU:2021-04864: Уязвимость реализации btrfs операционной системы Linux связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05198: Уязвимость спецификации Bluetooth Core Specification ядра операционной системы Linux, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-00595: Уязвимость реализации протокола IPv6 ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-05655: Уязвимость драйвера vmwgfx (drivers/gpu/vmxgfx/vmxgfx_kms.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-06017: Уязвимость реализации функции take_rmap_locks() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.\n\n * CVE-2021-34556: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.\n\n * CVE-2021-35477: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.\n\n * CVE-2021-3573: A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.\n\n * CVE-2021-3609: .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.\n\n * CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.\n\n * CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.\n\n * CVE-2021-38160: In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior\n\n * CVE-2021-38166: In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.\n\n * CVE-2021-38199: fs/nfs/nfs4client.c in the Linux kernel before 5.13.4 has incorrect connection-setup ordering, which allows operators of remote NFSv4 servers to cause a denial of service (hanging of mounts) by arranging for those servers to be unreachable during trunking detection.\n\n * CVE-2021-38201: net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.\n\n * CVE-2021-38202: fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.\n\n * CVE-2021-38203: btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info.\n\n * CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.\n\n * CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).\n\n * CVE-2021-45485: In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.\n\n * CVE-2022-36280: An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).\n\n * CVE-2022-41222: mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-08-11"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-08-11"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2021-03233",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03233",
|
||
"Impact": "High",
|
||
"Public": "20210619"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04027",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04027",
|
||
"Impact": "Low",
|
||
"Public": "20210715"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04028",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04028",
|
||
"Impact": "High",
|
||
"Public": "20210723"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04561",
|
||
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-665",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04561",
|
||
"Impact": "Low",
|
||
"Public": "20210613"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04710",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04710",
|
||
"Impact": "High",
|
||
"Public": "20210706"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04711",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04711",
|
||
"Impact": "High",
|
||
"Public": "20210613"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04840",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04840",
|
||
"Impact": "Low",
|
||
"Public": "20210729"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04845",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04845",
|
||
"Impact": "Low",
|
||
"Public": "20210729"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04846",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04846",
|
||
"Impact": "Low",
|
||
"Public": "20210531"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04848",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04848",
|
||
"Impact": "High",
|
||
"Public": "20210703"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04849",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04849",
|
||
"Impact": "High",
|
||
"Public": "20210806"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04851",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04851",
|
||
"Impact": "Low",
|
||
"Public": "20210721"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04852",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-824",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04852",
|
||
"Impact": "Low",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04864",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667, CWE-770",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04864",
|
||
"Impact": "Low",
|
||
"Public": "20210707"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05198",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05198",
|
||
"Impact": "Low",
|
||
"Public": "20210608"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00595",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-327",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00595",
|
||
"Impact": "High",
|
||
"Public": "20210531"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05655",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-120, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05655",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-06017",
|
||
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-06017",
|
||
"Impact": "Low",
|
||
"Public": "20210708"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2020-26558",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26558",
|
||
"Impact": "Low",
|
||
"Public": "20210524"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-34556",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-34556",
|
||
"Impact": "Low",
|
||
"Public": "20210802"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-35477",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-35477",
|
||
"Impact": "Low",
|
||
"Public": "20210802"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3573",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
|
||
"Impact": "Low",
|
||
"Public": "20210813"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3609",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
|
||
"Impact": "High",
|
||
"Public": "20220303"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-37159",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
|
||
"Impact": "Low",
|
||
"Public": "20210721"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-37576",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
|
||
"Impact": "High",
|
||
"Public": "20210726"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38160",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38160",
|
||
"Impact": "High",
|
||
"Public": "20210807"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38166",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38166",
|
||
"Impact": "High",
|
||
"Public": "20210807"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38199",
|
||
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38199",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38201",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38201",
|
||
"Impact": "High",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38202",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38202",
|
||
"Impact": "High",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38203",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38203",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38204",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38204",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38205",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-824",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38205",
|
||
"Impact": "Low",
|
||
"Public": "20210808"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-45485",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-327",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
|
||
"Impact": "High",
|
||
"Public": "20211225"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36280",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280",
|
||
"Impact": "Low",
|
||
"Public": "20220909"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41222",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222",
|
||
"Impact": "High",
|
||
"Public": "20220921"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:container:11"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486001",
|
||
"Comment": "kernel-doc-un is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486002",
|
||
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486003",
|
||
"Comment": "kernel-headers-un-def is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486004",
|
||
"Comment": "kernel-image-domU-un-def is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486005",
|
||
"Comment": "kernel-image-un-def is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486006",
|
||
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486007",
|
||
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486008",
|
||
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486009",
|
||
"Comment": "kernel-modules-ide-un-def is earlier than 1:5.13.9-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212486010",
|
||
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.13.9-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |