1442 lines
74 KiB
JSON
1442 lines
74 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20162238",
|
|
"Version": "oval:org.altlinux.errata:def:20162238",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-2238: package `MySQL` update to version 5.5.53-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-2238",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-2238",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11050",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11050",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11831",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11831",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11860",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11860",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11868",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11868",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11874",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11874",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11877",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11877",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11880",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11880",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11898",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11898",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11904",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11904",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11905",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11905",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11909",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11909",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11911",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11911",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11912",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11912",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11918",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11918",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11922",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11922",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11930",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11930",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-12154",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-12154",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00166",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00166",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00168",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00168",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00171",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00171",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00172",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00172",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00173",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00173",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00175",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00175",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00178",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00178",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00180",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00180",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00181",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00181",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00184",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00184",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01098",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01098",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01110",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01110",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01111",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01111",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01112",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01112",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01113",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01113",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01114",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01114",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01115",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01115",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01116",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01116",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01117",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01117",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01118",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01118",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01119",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01119",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01120",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01120",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2582",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2582",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2611",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2611",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2620",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2620",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2643",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2643",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2648",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2648",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4737",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4737",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4752",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4752",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4792",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4792",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4802",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4802",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4807",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4807",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4815",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4815",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4816",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4816",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4819",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4819",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4826",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4826",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4830",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4830",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4836",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4836",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4858",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4858",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4861",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4861",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4864",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4864",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4870",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4870",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4879",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4879",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4913",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4913",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0505",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0505",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0546",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0546",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0596",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0596",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0597",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0597",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0598",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0598",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0600",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0600",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0606",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0606",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0608",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0608",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0609",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0609",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0616",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0616",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0640",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0640",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0641",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0641",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0642",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0642",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0643",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0643",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0644",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0644",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0646",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0646",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0647",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0647",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0648",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0648",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0649",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0649",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0650",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0650",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0651",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0651",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0666",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0666",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2047",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2047",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3452",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3452",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3471",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3471",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3477",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3477",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3492",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3492",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3521",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3521",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3615",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3615",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5440",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5440",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5444",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5444",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5584",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5584",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5612",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5612",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5624",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5624",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5626",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5626",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5629",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5629",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6662",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6662",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6663",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6663",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6664",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6664",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7440",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7440",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-8283",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8283",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades MySQL to version 5.5.53-alt1. \nSecurity Fix(es):\n\n * BDU:2015-11050: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-11831: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11860: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю получить доступ к системе управления базами данных или выполнить произвольный код\n\n * BDU:2015-11868: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11874: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю изменять данные\n\n * BDU:2015-11877: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11880: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11898: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11904: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю изменять данные\n\n * BDU:2015-11905: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю выполнить несанкционированное чтение данных\n\n * BDU:2015-11909: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю получить доступ к MySQL Server или выполнить произвольный код\n\n * BDU:2015-11911: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11912: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11918: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11922: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11930: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-12154: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю нарушить доступность информации\n\n * BDU:2016-00166: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00168: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-00171: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00172: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00173: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00175: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать частичный отказ в обслуживании\n\n * BDU:2016-00178: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю модифицировать данные\n\n * BDU:2016-00180: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00181: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00184: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-01098: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на доступность информации\n\n * BDU:2016-01110: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на доступность информации\n\n * BDU:2016-01111: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на доступность информации\n\n * BDU:2016-01112: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на доступность информации\n\n * BDU:2016-01113: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на доступность информации\n\n * BDU:2016-01114: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на доступность информации\n\n * BDU:2016-01115: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на доступность информации\n\n * BDU:2016-01116: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на доступность информации\n\n * BDU:2016-01117: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на конфиденциальность информации\n\n * BDU:2016-01118: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на целостность и доступность информации\n\n * BDU:2016-01119: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на конфиденциальность информации\n\n * BDU:2016-01120: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю повлиять на целостность и доступность информации\n\n * CVE-2015-2582: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.\n\n * CVE-2015-2611: Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.\n\n * CVE-2015-2620: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.\n\n * CVE-2015-2643: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.\n\n * CVE-2015-2648: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.\n\n * CVE-2015-4737: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Pluggable Auth.\n\n * CVE-2015-4752: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.\n\n * CVE-2015-4792: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.\n\n * CVE-2015-4802: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.\n\n * CVE-2015-4807: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.\n\n * CVE-2015-4815: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.\n\n * CVE-2015-4816: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.\n\n * CVE-2015-4819: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.\n\n * CVE-2015-4826: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.\n\n * CVE-2015-4830: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.\n\n * CVE-2015-4836: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.\n\n * CVE-2015-4858: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.\n\n * CVE-2015-4861: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.\n\n * CVE-2015-4864: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.\n\n * CVE-2015-4870: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.\n\n * CVE-2015-4879: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.\n\n * CVE-2015-4913: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.\n\n * CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.\n\n * CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.\n\n * CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.\n\n * CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.\n\n * CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.\n\n * CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.\n\n * CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.\n\n * CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.\n\n * CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.\n\n * CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.\n\n * CVE-2016-0640: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.\n\n * CVE-2016-0641: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.\n\n * CVE-2016-0642: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.\n\n * CVE-2016-0643: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.\n\n * CVE-2016-0644: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.\n\n * CVE-2016-0646: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.\n\n * CVE-2016-0647: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.\n\n * CVE-2016-0648: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.\n\n * CVE-2016-0649: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.\n\n * CVE-2016-0650: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.\n\n * CVE-2016-0651: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.\n\n * CVE-2016-0666: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.\n\n * CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a \"/CN=\" string in a field in a certificate, as demonstrated by \"/OU=/CN=bar.com/CN=foo.com.\"\n\n * CVE-2016-3452: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related to Server: Security: Encryption.\n\n * CVE-2016-3471: Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.\n\n * CVE-2016-3477: Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.\n\n * CVE-2016-3492: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.\n\n * CVE-2016-3521: Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.\n\n * CVE-2016-3615: Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.\n\n * CVE-2016-5440: Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.\n\n * CVE-2016-5444: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related to Server: Connection.\n\n * CVE-2016-5584: Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.\n\n * CVE-2016-5612: Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.\n\n * CVE-2016-5624: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.\n\n * CVE-2016-5626: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.\n\n * CVE-2016-5629: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.\n\n * CVE-2016-6662: Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.\n\n * CVE-2016-6663: Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.\n\n * CVE-2016-6664: mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.\n\n * CVE-2016-7440: The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.\n\n * CVE-2016-8283: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-11-03"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-11-03"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-11050",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11050",
|
|
"Impact": "Low",
|
|
"Public": "20150714"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11831",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11831",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11860",
|
|
"CVSS": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11860",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11868",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11868",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11874",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11874",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11877",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11877",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11880",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11880",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11898",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11898",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11904",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11904",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11905",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11905",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11909",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11909",
|
|
"Impact": "High",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11911",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11911",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11912",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11912",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11918",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11918",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11922",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11922",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11930",
|
|
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11930",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-12154",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-12154",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00166",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00166",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00168",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00168",
|
|
"Impact": "High",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00171",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00171",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00172",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00172",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00173",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00173",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00175",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00175",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00178",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00178",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00180",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00180",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00181",
|
|
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00181",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00184",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00184",
|
|
"Impact": "Low",
|
|
"Public": "20160119"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01098",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01098",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01110",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01110",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01111",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01111",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01112",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01112",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01113",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01113",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01114",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01114",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01115",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01115",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01116",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01116",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01117",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01117",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01118",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01118",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01119",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01119",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01120",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01120",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2015-2582",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2582",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2611",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2611",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2620",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2620",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2643",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2643",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2648",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2648",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4737",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4737",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4752",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4752",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4792",
|
|
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4792",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4802",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4802",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4807",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4807",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4815",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4815",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4816",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4816",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4819",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4819",
|
|
"Impact": "High",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4826",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4826",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4830",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4830",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4836",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4836",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4858",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4858",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4861",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4861",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4864",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4864",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4870",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4870",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4879",
|
|
"CVSS": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4879",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4913",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4913",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0505",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0505",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0546",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0546",
|
|
"Impact": "High",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0596",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0596",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0597",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0597",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0598",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0598",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0600",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0600",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0606",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0606",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0608",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0608",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0609",
|
|
"CVSS": "AV:N/AC:H/Au:M/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0609",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0616",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0616",
|
|
"Impact": "Low",
|
|
"Public": "20160121"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0640",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0640",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0641",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0641",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0642",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0642",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0643",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0643",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0644",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0644",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0646",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0646",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0647",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0647",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0648",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0648",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0649",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0649",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0650",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0650",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0651",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0651",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0666",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0666",
|
|
"Impact": "Low",
|
|
"Public": "20160421"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2047",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2047",
|
|
"Impact": "Low",
|
|
"Public": "20160127"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3452",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3452",
|
|
"Impact": "Low",
|
|
"Public": "20160721"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3471",
|
|
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3471",
|
|
"Impact": "High",
|
|
"Public": "20160721"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3477",
|
|
"CVSS": "AV:L/AC:M/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3477",
|
|
"Impact": "High",
|
|
"Public": "20160721"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3492",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3492",
|
|
"Impact": "Low",
|
|
"Public": "20161025"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3521",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3521",
|
|
"Impact": "Low",
|
|
"Public": "20160721"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3615",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3615",
|
|
"Impact": "Low",
|
|
"Public": "20160721"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5440",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5440",
|
|
"Impact": "Low",
|
|
"Public": "20160721"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5444",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5444",
|
|
"Impact": "Low",
|
|
"Public": "20160721"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5584",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5584",
|
|
"Impact": "Low",
|
|
"Public": "20161025"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5612",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5612",
|
|
"Impact": "Low",
|
|
"Public": "20161025"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5624",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5624",
|
|
"Impact": "Low",
|
|
"Public": "20161025"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5626",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5626",
|
|
"Impact": "Low",
|
|
"Public": "20161025"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5629",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5629",
|
|
"Impact": "Low",
|
|
"Public": "20161025"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6662",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6662",
|
|
"Impact": "Critical",
|
|
"Public": "20160920"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6663",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6663",
|
|
"Impact": "High",
|
|
"Public": "20161213"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6664",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-59",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6664",
|
|
"Impact": "High",
|
|
"Public": "20161213"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7440",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7440",
|
|
"Impact": "Low",
|
|
"Public": "20161213"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-8283",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8283",
|
|
"Impact": "Low",
|
|
"Public": "20161025"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20162238001",
|
|
"Comment": "MySQL-bench is earlier than 0:5.5.53-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20162238002",
|
|
"Comment": "MySQL-client is earlier than 0:5.5.53-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20162238003",
|
|
"Comment": "MySQL-server is earlier than 0:5.5.53-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20162238004",
|
|
"Comment": "MySQL-server-perl is earlier than 0:5.5.53-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |