2024-05-30 03:02:27 +00:00

1773 lines
99 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211105",
"Version": "oval:org.altlinux.errata:def:20211105",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1105: package `kernel-image-rpi-un` update to version 5.10.7-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1105",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1105",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-03245",
"RefURL": "https://bdu.fstec.ru/vul/2020-03245",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03246",
"RefURL": "https://bdu.fstec.ru/vul/2020-03246",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03247",
"RefURL": "https://bdu.fstec.ru/vul/2020-03247",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04337",
"RefURL": "https://bdu.fstec.ru/vul/2020-04337",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04339",
"RefURL": "https://bdu.fstec.ru/vul/2020-04339",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05278",
"RefURL": "https://bdu.fstec.ru/vul/2020-05278",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05383",
"RefURL": "https://bdu.fstec.ru/vul/2020-05383",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05386",
"RefURL": "https://bdu.fstec.ru/vul/2020-05386",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05454",
"RefURL": "https://bdu.fstec.ru/vul/2020-05454",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05539",
"RefURL": "https://bdu.fstec.ru/vul/2020-05539",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05544",
"RefURL": "https://bdu.fstec.ru/vul/2020-05544",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05547",
"RefURL": "https://bdu.fstec.ru/vul/2020-05547",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05549",
"RefURL": "https://bdu.fstec.ru/vul/2020-05549",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05635",
"RefURL": "https://bdu.fstec.ru/vul/2020-05635",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05656",
"RefURL": "https://bdu.fstec.ru/vul/2020-05656",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05701",
"RefURL": "https://bdu.fstec.ru/vul/2020-05701",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05723",
"RefURL": "https://bdu.fstec.ru/vul/2020-05723",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05802",
"RefURL": "https://bdu.fstec.ru/vul/2020-05802",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05831",
"RefURL": "https://bdu.fstec.ru/vul/2020-05831",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05832",
"RefURL": "https://bdu.fstec.ru/vul/2020-05832",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00005",
"RefURL": "https://bdu.fstec.ru/vul/2021-00005",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00006",
"RefURL": "https://bdu.fstec.ru/vul/2021-00006",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00014",
"RefURL": "https://bdu.fstec.ru/vul/2021-00014",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00106",
"RefURL": "https://bdu.fstec.ru/vul/2021-00106",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00137",
"RefURL": "https://bdu.fstec.ru/vul/2021-00137",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00261",
"RefURL": "https://bdu.fstec.ru/vul/2021-00261",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00284",
"RefURL": "https://bdu.fstec.ru/vul/2021-00284",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00285",
"RefURL": "https://bdu.fstec.ru/vul/2021-00285",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01617",
"RefURL": "https://bdu.fstec.ru/vul/2021-01617",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01953",
"RefURL": "https://bdu.fstec.ru/vul/2021-01953",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01954",
"RefURL": "https://bdu.fstec.ru/vul/2021-01954",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01956",
"RefURL": "https://bdu.fstec.ru/vul/2021-01956",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02144",
"RefURL": "https://bdu.fstec.ru/vul/2021-02144",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02305",
"RefURL": "https://bdu.fstec.ru/vul/2021-02305",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02587",
"RefURL": "https://bdu.fstec.ru/vul/2021-02587",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02588",
"RefURL": "https://bdu.fstec.ru/vul/2021-02588",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02589",
"RefURL": "https://bdu.fstec.ru/vul/2021-02589",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03189",
"RefURL": "https://bdu.fstec.ru/vul/2021-03189",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03291",
"RefURL": "https://bdu.fstec.ru/vul/2021-03291",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03394",
"RefURL": "https://bdu.fstec.ru/vul/2021-03394",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03443",
"RefURL": "https://bdu.fstec.ru/vul/2021-03443",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04835",
"RefURL": "https://bdu.fstec.ru/vul/2021-04835",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06412",
"RefURL": "https://bdu.fstec.ru/vul/2021-06412",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02505",
"RefURL": "https://bdu.fstec.ru/vul/2022-02505",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05386",
"RefURL": "https://bdu.fstec.ru/vul/2022-05386",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05472",
"RefURL": "https://bdu.fstec.ru/vul/2022-05472",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05774",
"RefURL": "https://bdu.fstec.ru/vul/2022-05774",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05916",
"RefURL": "https://bdu.fstec.ru/vul/2022-05916",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06617",
"RefURL": "https://bdu.fstec.ru/vul/2022-06617",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06902",
"RefURL": "https://bdu.fstec.ru/vul/2022-06902",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07048",
"RefURL": "https://bdu.fstec.ru/vul/2022-07048",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00628",
"RefURL": "https://bdu.fstec.ru/vul/2023-00628",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00700",
"RefURL": "https://bdu.fstec.ru/vul/2023-00700",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01750",
"RefURL": "https://bdu.fstec.ru/vul/2023-01750",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02799",
"RefURL": "https://bdu.fstec.ru/vul/2023-02799",
"Source": "BDU"
},
{
"RefID": "CVE-2020-10766",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10767",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10768",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10781",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10781",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14314",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14331",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14351",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14351",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14356",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14385",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14386",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14390",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14390",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15436",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15436",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15437",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15852",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15852",
"Source": "CVE"
},
{
"RefID": "CVE-2020-16166",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-16166",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25211",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25211",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25212",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25221",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25221",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25284",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25285",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25641",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25643",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25645",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25645",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25656",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25669",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25669",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25704",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704",
"Source": "CVE"
},
{
"RefID": "CVE-2020-25705",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705",
"Source": "CVE"
},
{
"RefID": "CVE-2020-26088",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26088",
"Source": "CVE"
},
{
"RefID": "CVE-2020-26541",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27152",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27152",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27194",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27194",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27675",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27675",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27777",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27784",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27784",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27830",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27830",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28097",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28097",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28374",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28915",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28915",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28941",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28941",
"Source": "CVE"
},
{
"RefID": "CVE-2020-28974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29369",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29369",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29371",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29371",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29534",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29534",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29569",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29569",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29660",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29661",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36158",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36310",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36310",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36311",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36311",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36312",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36322",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36385",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36386",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36387",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36387",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36691",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36691",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36694",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694",
"Source": "CVE"
},
{
"RefID": "CVE-2021-20292",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20292",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3411",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3411",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3428",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3612",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4204",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4204",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0812",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0812",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1789",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0240",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-rpi-un to version 5.10.7-alt1. \nSecurity Fix(es):\n\n * BDU:2020-03245: Уязвимость функции prctl() ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-03246: Уязвимость реализации технологии Single Thread Indirect Branch Predictors (STIBP) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-03247: Уязвимость компонента SSBD ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-04337: Уязвимость функции fbcon_redraw_softback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04339: Уязвимость реализации файловой системы XFS операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05278: Уязвимость компонента drivers/xen/events/events_base.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05383: Уязвимость реализации протокола GENEVE (Generic Network Virtualization Encapsulation) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05386: Уязвимость функции scalar32_min_max_or (kernel/bpf/verifier.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05454: Уязвимость функции sunkbd_reinit() (drivers/input/keyboard/sunkbd.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05539: Уязвимость ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05544: Уязвимость функции KD_FONT_OP_COPY драйвера fbcon ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2020-05547: Уязвимость функций expand_downwards и expand_upwards (mm/mmap.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05549: Уязвимость функции romfs_dev_read (fs/romfs/storage.c) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05635: Уязвимость утилиты sysctl hugetlbl операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повышение привилегий\n\n * BDU:2020-05656: Уязвимость rbd-драйвера операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2020-05701: Уязвимость функции iov_iter_copy_from_user_atomic () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05723: Уязвимость сетевой файловой системы Network File System (NFS) операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2020-05802: Уязвимость функции net/nfc/rawsock.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2020-05831: Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-05832: Уязвимость подсистемы perf ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-00005: Уязвимость компонента drivers/tty/tty_jobctrl.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00006: Уязвимость компонентов drivers/tty/tty_jobctrl.c и drivers/tty/tty_io.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00014: Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-00106: Уязвимость модуля HDLC_PPP ядра операционной системы Linux, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00137: Уязвимость функции io_uring ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-00261: Уязвимость ядра операционной системы Linux, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00284: Уязвимость ядра операционной системы Linux, связанная с некорректной проверкой криптографической подписи, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00285: Уязвимость файла fs/block_dev.c ядра операционной системы Linux, связанная с использованием памяти после ее освобождения, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2021-01617: Уязвимость функции can_optimize (arch/x86/kernel/kprobes/opt.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-01953: Уязвимость функции kvm_io_bus_unregister_dev (virt/kvm/kvm_main.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01954: Уязвимость функции set_memory_region_test (arch/x86/kvm/svm/svm.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01956: Уязвимость компонентов arch/x86/kvm/svm/sev.c подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02144: Уязвимость модуля ZRAM ядра операционных систем Linux, Ubuntu и OpenSUSE Leap, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02305: Уязвимость функции в drivers/char/random.c and kernel/time/timer.c ядра операционной системы Linux, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2021-02587: Уязвимость драйверов drivers/target/target_core_xcopy.c ядра операционной системы Linux, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2021-02588: Уязвимость функции ioapic_lazy_update_eoi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02589: Уязвимость функции tss_invalidate_io_bitmap ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-03189: Уязвимость подсистемы cgroupv2 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2021-03291: Уязвимость подсистемы vgacon ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на доступность защищаемой информации\n\n * BDU:2021-03394: Уязвимость компонента net/packet/af_packet.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании\n\n * BDU:2021-03443: Уязвимость компонента RTAS ядра операционной системы Linux, связанная с отсутствием механизма авторизации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-04835: Уязвимость компонента drivers/gpu/drm/nouveau/nouveau_sgdma.c ядра операционной системы Linux , связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код с root привилегиями\n\n * BDU:2021-06412: Уязвимость ядра операционной системы Linux, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02505: Уязвимость реализации файловой системы FUSE ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05386: Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании, аварийное завершение работы приложения или выполнить произвольный код\n\n * BDU:2022-05472: Уязвимость компонента net/sunrpc/xprtrdma/rpc_rdma.c ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-05774: Уязвимость функции ext4_es_cache_extent() компонента fs/ext4/extents.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05916: Уязвимость компонента drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-06617: Уязвимость компонента net/bluetooth/hci_event.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06902: Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-07048: Уязвимость функции mwifiex_cmd_802_11_ad_hoc_start() драйвера marvell ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00628: Уязвимость функции io_prep_async_work() подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-00700: Уязвимость функции vgacon_scrollback_cur() видеодрайвера ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01750: Уязвимость компонента lib/nlattr.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02799: Уязвимость функции xt_replace_table() в модуле net/netfilter/x_tables.c межсетевого экрана netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2020-10766: A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.\n\n * CVE-2020-10767: A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.\n\n * CVE-2020-10768: A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.\n\n * CVE-2020-10781: A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.\n\n * CVE-2020-14314: A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.\n\n * CVE-2020-14331: A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2020-14351: A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2020-14356: A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.\n\n * CVE-2020-14385: A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.\n\n * CVE-2020-14386: A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.\n\n * CVE-2020-14390: A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.\n\n * CVE-2020-15436: Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.\n\n * CVE-2020-15437: The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.\n\n * CVE-2020-15852: An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.\n\n * CVE-2020-16166: The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.\n\n * CVE-2020-25211: In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.\n\n * CVE-2020-25212: A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.\n\n * CVE-2020-25221: get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.\n\n * CVE-2020-25284: The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.\n\n * CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.\n\n * CVE-2020-25641: A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n * CVE-2020-25643: A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2020-25645: A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.\n\n * CVE-2020-25656: A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.\n\n * CVE-2020-25669: A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.\n\n * CVE-2020-25704: A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.\n\n * CVE-2020-25705: A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version\n\n * CVE-2020-26088: A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.\n\n * CVE-2020-26541: The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.\n\n * CVE-2020-27152: An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioapic.c in the Linux kernel before 5.9.2. It has an infinite loop related to improper interaction between a resampler and edge triggering, aka CID-77377064c3a9.\n\n * CVE-2020-27194: An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.\n\n * CVE-2020-27675: An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.\n\n * CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.\n\n * CVE-2020-27784: A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().\n\n * CVE-2020-27830: A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.\n\n * CVE-2020-28097: The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.\n\n * CVE-2020-28374: In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.\n\n * CVE-2020-28915: A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.\n\n * CVE-2020-28941: An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.\n\n * CVE-2020-28974: A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.\n\n * CVE-2020-29369: An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.\n\n * CVE-2020-29371: An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.\n\n * CVE-2020-29534: An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.\n\n * CVE-2020-29569: An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.\n\n * CVE-2020-29660: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.\n\n * CVE-2020-29661: A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.\n\n * CVE-2020-36158: mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.\n\n * CVE-2020-36310: An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.\n\n * CVE-2020-36311: An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.\n\n * CVE-2020-36312: An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.\n\n * CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.\n\n * CVE-2020-36385: An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.\n\n * CVE-2020-36386: An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.\n\n * CVE-2020-36387: An issue was discovered in the Linux kernel before 5.8.2. fs/io_uring.c has a use-after-free related to io_async_task_func and ctx reference holding, aka CID-6d816e088c35.\n\n * CVE-2020-36691: An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.\n\n * CVE-2020-36694: An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.\n\n * CVE-2021-20292: There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.\n\n * CVE-2021-3411: A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2021-3428: A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.\n\n * CVE-2021-3612: An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2021-4204: An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.\n\n * CVE-2022-0812: An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information.\n\n * CVE-2022-1789: With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.\n\n * CVE-2023-0240: There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.\n\nIn the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-01-21"
},
"Updated": {
"Date": "2021-01-21"
},
"BDUs": [
{
"ID": "BDU:2020-03245",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-440",
"Href": "https://bdu.fstec.ru/vul/2020-03245",
"Impact": "Low",
"Public": "20200609"
},
{
"ID": "BDU:2020-03246",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-440",
"Href": "https://bdu.fstec.ru/vul/2020-03246",
"Impact": "Low",
"Public": "20200609"
},
{
"ID": "BDU:2020-03247",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-440",
"Href": "https://bdu.fstec.ru/vul/2020-03247",
"Impact": "Low",
"Public": "20200609"
},
{
"ID": "BDU:2020-04337",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-04337",
"Impact": "Low",
"Public": "20200918"
},
{
"ID": "BDU:2020-04339",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-131",
"Href": "https://bdu.fstec.ru/vul/2020-04339",
"Impact": "Low",
"Public": "20200915"
},
{
"ID": "BDU:2020-05278",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-05278",
"Impact": "Low",
"Public": "20200907"
},
{
"ID": "BDU:2020-05383",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-319",
"Href": "https://bdu.fstec.ru/vul/2020-05383",
"Impact": "High",
"Public": "20201013"
},
{
"ID": "BDU:2020-05386",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-05386",
"Impact": "Low",
"Public": "20201016"
},
{
"ID": "BDU:2020-05454",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05454",
"Impact": "Low",
"Public": "20201026"
},
{
"ID": "BDU:2020-05539",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://bdu.fstec.ru/vul/2020-05539",
"Impact": "High",
"Public": "20201104"
},
{
"ID": "BDU:2020-05544",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-05544",
"Impact": "High",
"Public": "20201106"
},
{
"ID": "BDU:2020-05547",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05547",
"Impact": "High",
"Public": "20200630"
},
{
"ID": "BDU:2020-05549",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05549",
"Impact": "Low",
"Public": "20200820"
},
{
"ID": "BDU:2020-05635",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-05635",
"Impact": "Low",
"Public": "20200913"
},
{
"ID": "BDU:2020-05656",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:C/A:N",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-05656",
"Impact": "Low",
"Public": "20200913"
},
{
"ID": "BDU:2020-05701",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2020-05701",
"Impact": "Low",
"Public": "20201006"
},
{
"ID": "BDU:2020-05723",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-367",
"Href": "https://bdu.fstec.ru/vul/2020-05723",
"Impact": "Low",
"Public": "20201101"
},
{
"ID": "BDU:2020-05802",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-05802",
"Impact": "Low",
"Public": "20200819"
},
{
"ID": "BDU:2020-05831",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05831",
"Impact": "Low",
"Public": "20201016"
},
{
"ID": "BDU:2020-05832",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05832",
"Impact": "Low",
"Public": "20200910"
},
{
"ID": "BDU:2021-00005",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2021-00005",
"Impact": "High",
"Public": "20201203"
},
{
"ID": "BDU:2021-00006",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2021-00006",
"Impact": "Low",
"Public": "20201203"
},
{
"ID": "BDU:2021-00014",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-252, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00014",
"Impact": "High",
"Public": "20201214"
},
{
"ID": "BDU:2021-00106",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00106",
"Impact": "High",
"Public": "20201006"
},
{
"ID": "BDU:2021-00137",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-266",
"Href": "https://bdu.fstec.ru/vul/2021-00137",
"Impact": "High",
"Public": "20201203"
},
{
"ID": "BDU:2021-00261",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-00261",
"Impact": "Low",
"Public": "20201123"
},
{
"ID": "BDU:2021-00284",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-200, CWE-347",
"Href": "https://bdu.fstec.ru/vul/2021-00284",
"Impact": "Low",
"Public": "20201002"
},
{
"ID": "BDU:2021-00285",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-00285",
"Impact": "Low",
"Public": "20201123"
},
{
"ID": "BDU:2021-01617",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://bdu.fstec.ru/vul/2021-01617",
"Impact": "Low",
"Public": "20210126"
},
{
"ID": "BDU:2021-01953",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2021-01953",
"Impact": "Low",
"Public": "20210406"
},
{
"ID": "BDU:2021-01954",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2021-01954",
"Impact": "Low",
"Public": "20210406"
},
{
"ID": "BDU:2021-01956",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2021-01956",
"Impact": "Low",
"Public": "20210406"
},
{
"ID": "BDU:2021-02144",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2021-02144",
"Impact": "Low",
"Public": "20200617"
},
{
"ID": "BDU:2021-02305",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-02305",
"Impact": "Low",
"Public": "20200720"
},
{
"ID": "BDU:2021-02587",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2021-02587",
"Impact": "High",
"Public": "20210111"
},
{
"ID": "BDU:2021-02588",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2021-02588",
"Impact": "Low",
"Public": "20201024"
},
{
"ID": "BDU:2021-02589",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2021-02589",
"Impact": "High",
"Public": "20200720"
},
{
"ID": "BDU:2021-03189",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-03189",
"Impact": "High",
"Public": "20200707"
},
{
"ID": "BDU:2021-03291",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-03291",
"Impact": "Low",
"Public": "20200914"
},
{
"ID": "BDU:2021-03394",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-03394",
"Impact": "High",
"Public": "20200903"
},
{
"ID": "BDU:2021-03443",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://bdu.fstec.ru/vul/2021-03443",
"Impact": "Low",
"Public": "20200820"
},
{
"ID": "BDU:2021-04835",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04835",
"Impact": "Low",
"Public": "20210528"
},
{
"ID": "BDU:2021-06412",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-06412",
"Impact": "Low",
"Public": "20201118"
},
{
"ID": "BDU:2022-02505",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404, CWE-459",
"Href": "https://bdu.fstec.ru/vul/2022-02505",
"Impact": "Low",
"Public": "20201210"
},
{
"ID": "BDU:2022-05386",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-05386",
"Impact": "High",
"Public": "20220824"
},
{
"ID": "BDU:2022-05472",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-05472",
"Impact": "High",
"Public": "20220829"
},
{
"ID": "BDU:2022-05774",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-05774",
"Impact": "Low",
"Public": "20200629"
},
{
"ID": "BDU:2022-05916",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05916",
"Impact": "High",
"Public": "20200914"
},
{
"ID": "BDU:2022-06617",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-06617",
"Impact": "High",
"Public": "20210607"
},
{
"ID": "BDU:2022-06902",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-06902",
"Impact": "Low",
"Public": "20220520"
},
{
"ID": "BDU:2022-07048",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-07048",
"Impact": "Low",
"Public": "20201208"
},
{
"ID": "BDU:2023-00628",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-00628",
"Impact": "High",
"Public": "20210221"
},
{
"ID": "BDU:2023-00700",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-00700",
"Impact": "Low",
"Public": "20200804"
},
{
"ID": "BDU:2023-01750",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404, CWE-674",
"Href": "https://bdu.fstec.ru/vul/2023-01750",
"Impact": "Low",
"Public": "20200501"
},
{
"ID": "BDU:2023-02799",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-02799",
"Impact": "Critical",
"Public": "20210315"
}
],
"CVEs": [
{
"ID": "CVE-2020-10766",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766",
"Impact": "Low",
"Public": "20200915"
},
{
"ID": "CVE-2020-10767",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767",
"Impact": "Low",
"Public": "20200915"
},
{
"ID": "CVE-2020-10768",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768",
"Impact": "Low",
"Public": "20200916"
},
{
"ID": "CVE-2020-10781",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10781",
"Impact": "Low",
"Public": "20200916"
},
{
"ID": "CVE-2020-14314",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314",
"Impact": "Low",
"Public": "20200915"
},
{
"ID": "CVE-2020-14331",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331",
"Impact": "Low",
"Public": "20200915"
},
{
"ID": "CVE-2020-14351",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14351",
"Impact": "High",
"Public": "20201203"
},
{
"ID": "CVE-2020-14356",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356",
"Impact": "High",
"Public": "20200819"
},
{
"ID": "CVE-2020-14385",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-131",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385",
"Impact": "Low",
"Public": "20200915"
},
{
"ID": "CVE-2020-14386",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386",
"Impact": "High",
"Public": "20200916"
},
{
"ID": "CVE-2020-14390",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14390",
"Impact": "Low",
"Public": "20200918"
},
{
"ID": "CVE-2020-15436",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15436",
"Impact": "Low",
"Public": "20201123"
},
{
"ID": "CVE-2020-15437",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437",
"Impact": "Low",
"Public": "20201123"
},
{
"ID": "CVE-2020-15852",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15852",
"Impact": "High",
"Public": "20200720"
},
{
"ID": "CVE-2020-16166",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-16166",
"Impact": "Low",
"Public": "20200730"
},
{
"ID": "CVE-2020-25211",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25211",
"Impact": "Low",
"Public": "20200909"
},
{
"ID": "CVE-2020-25212",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212",
"Impact": "High",
"Public": "20200909"
},
{
"ID": "CVE-2020-25221",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-672",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25221",
"Impact": "High",
"Public": "20200910"
},
{
"ID": "CVE-2020-25284",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284",
"Impact": "Low",
"Public": "20200913"
},
{
"ID": "CVE-2020-25285",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285",
"Impact": "Low",
"Public": "20200913"
},
{
"ID": "CVE-2020-25641",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
"Impact": "Low",
"Public": "20201006"
},
{
"ID": "CVE-2020-25643",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643",
"Impact": "High",
"Public": "20201006"
},
{
"ID": "CVE-2020-25645",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-319",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25645",
"Impact": "High",
"Public": "20201013"
},
{
"ID": "CVE-2020-25656",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25656",
"Impact": "Low",
"Public": "20201202"
},
{
"ID": "CVE-2020-25669",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25669",
"Impact": "High",
"Public": "20210526"
},
{
"ID": "CVE-2020-25704",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704",
"Impact": "Low",
"Public": "20201202"
},
{
"ID": "CVE-2020-25705",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705",
"Impact": "High",
"Public": "20201117"
},
{
"ID": "CVE-2020-26088",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26088",
"Impact": "Low",
"Public": "20200924"
},
{
"ID": "CVE-2020-26541",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26541",
"Impact": "Low",
"Public": "20201002"
},
{
"ID": "CVE-2020-27152",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27152",
"Impact": "Low",
"Public": "20201106"
},
{
"ID": "CVE-2020-27194",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-681",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27194",
"Impact": "Low",
"Public": "20201016"
},
{
"ID": "CVE-2020-27675",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27675",
"Impact": "Low",
"Public": "20201022"
},
{
"ID": "CVE-2020-27777",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"Impact": "Low",
"Public": "20201215"
},
{
"ID": "CVE-2020-27784",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27784",
"Impact": "Low",
"Public": "20220901"
},
{
"ID": "CVE-2020-27830",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27830",
"Impact": "Low",
"Public": "20210513"
},
{
"ID": "CVE-2020-28097",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28097",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "CVE-2020-28374",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
"Impact": "High",
"Public": "20210113"
},
{
"ID": "CVE-2020-28915",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28915",
"Impact": "Low",
"Public": "20201118"
},
{
"ID": "CVE-2020-28941",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-763",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28941",
"Impact": "Low",
"Public": "20201119"
},
{
"ID": "CVE-2020-28974",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974",
"Impact": "Low",
"Public": "20201120"
},
{
"ID": "CVE-2020-29369",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29369",
"Impact": "High",
"Public": "20201128"
},
{
"ID": "CVE-2020-29371",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29371",
"Impact": "Low",
"Public": "20201128"
},
{
"ID": "CVE-2020-29534",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29534",
"Impact": "High",
"Public": "20201203"
},
{
"ID": "CVE-2020-29569",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29569",
"Impact": "High",
"Public": "20201215"
},
{
"ID": "CVE-2020-29660",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"Impact": "Low",
"Public": "20201209"
},
{
"ID": "CVE-2020-29661",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661",
"Impact": "High",
"Public": "20201209"
},
{
"ID": "CVE-2020-36158",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"Impact": "Low",
"Public": "20210105"
},
{
"ID": "CVE-2020-36310",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36310",
"Impact": "Low",
"Public": "20210407"
},
{
"ID": "CVE-2020-36311",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36311",
"Impact": "Low",
"Public": "20210407"
},
{
"ID": "CVE-2020-36312",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"Impact": "Low",
"Public": "20210407"
},
{
"ID": "CVE-2020-36322",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-459",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322",
"Impact": "Low",
"Public": "20210414"
},
{
"ID": "CVE-2020-36385",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"Impact": "High",
"Public": "20210607"
},
{
"ID": "CVE-2020-36386",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"Impact": "High",
"Public": "20210607"
},
{
"ID": "CVE-2020-36387",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36387",
"Impact": "High",
"Public": "20210607"
},
{
"ID": "CVE-2020-36691",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-674",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36691",
"Impact": "Low",
"Public": "20230324"
},
{
"ID": "CVE-2020-36694",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694",
"Impact": "Low",
"Public": "20230521"
},
{
"ID": "CVE-2021-20292",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20292",
"Impact": "Low",
"Public": "20210528"
},
{
"ID": "CVE-2021-3411",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3411",
"Impact": "Low",
"Public": "20210309"
},
{
"ID": "CVE-2021-3428",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428",
"Impact": "Low",
"Public": "20220304"
},
{
"ID": "CVE-2021-3612",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"Impact": "High",
"Public": "20210709"
},
{
"ID": "CVE-2021-4204",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4204",
"Impact": "High",
"Public": "20220824"
},
{
"ID": "CVE-2022-0812",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0812",
"Impact": "Low",
"Public": "20220829"
},
{
"ID": "CVE-2022-1789",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789",
"Impact": "Low",
"Public": "20220602"
},
{
"ID": "CVE-2023-0240",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240",
"Impact": "High",
"Public": "20230130"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211105001",
"Comment": "kernel-headers-modules-rpi-un is earlier than 1:5.10.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211105002",
"Comment": "kernel-headers-rpi-un is earlier than 1:5.10.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211105003",
"Comment": "kernel-image-rpi-un is earlier than 1:5.10.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211105004",
"Comment": "kernel-modules-staging-rpi-un is earlier than 1:5.10.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211105005",
"Comment": "kernel-modules-v4l-rpi-un is earlier than 1:5.10.7-alt1"
}
]
}
]
}
}
]
}