2024-07-23 15:04:31 +00:00

1315 lines
71 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20141422",
"Version": "oval:org.altlinux.errata:def:20141422",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2014-1422: package `kernel-image-std-def` update to version 3.12.15-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2014-1422",
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-1422",
"Source": "ALTPU"
},
{
"RefID": "BDU:2014-00087",
"RefURL": "https://bdu.fstec.ru/vul/2014-00087",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00088",
"RefURL": "https://bdu.fstec.ru/vul/2014-00088",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00089",
"RefURL": "https://bdu.fstec.ru/vul/2014-00089",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00091",
"RefURL": "https://bdu.fstec.ru/vul/2014-00091",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00092",
"RefURL": "https://bdu.fstec.ru/vul/2014-00092",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00093",
"RefURL": "https://bdu.fstec.ru/vul/2014-00093",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00094",
"RefURL": "https://bdu.fstec.ru/vul/2014-00094",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00095",
"RefURL": "https://bdu.fstec.ru/vul/2014-00095",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00096",
"RefURL": "https://bdu.fstec.ru/vul/2014-00096",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00097",
"RefURL": "https://bdu.fstec.ru/vul/2014-00097",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00098",
"RefURL": "https://bdu.fstec.ru/vul/2014-00098",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00099",
"RefURL": "https://bdu.fstec.ru/vul/2014-00099",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00100",
"RefURL": "https://bdu.fstec.ru/vul/2014-00100",
"Source": "BDU"
},
{
"RefID": "BDU:2014-00101",
"RefURL": "https://bdu.fstec.ru/vul/2014-00101",
"Source": "BDU"
},
{
"RefID": "BDU:2015-04307",
"RefURL": "https://bdu.fstec.ru/vul/2015-04307",
"Source": "BDU"
},
{
"RefID": "BDU:2015-04308",
"RefURL": "https://bdu.fstec.ru/vul/2015-04308",
"Source": "BDU"
},
{
"RefID": "BDU:2015-04309",
"RefURL": "https://bdu.fstec.ru/vul/2015-04309",
"Source": "BDU"
},
{
"RefID": "BDU:2015-04310",
"RefURL": "https://bdu.fstec.ru/vul/2015-04310",
"Source": "BDU"
},
{
"RefID": "BDU:2016-02003",
"RefURL": "https://bdu.fstec.ru/vul/2016-02003",
"Source": "BDU"
},
{
"RefID": "BDU:2016-02026",
"RefURL": "https://bdu.fstec.ru/vul/2016-02026",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02779",
"RefURL": "https://bdu.fstec.ru/vul/2019-02779",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01410",
"RefURL": "https://bdu.fstec.ru/vul/2021-01410",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01630",
"RefURL": "https://bdu.fstec.ru/vul/2022-01630",
"Source": "BDU"
},
{
"RefID": "CVE-2013-2888",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2888",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2889",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2889",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2890",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2890",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2891",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2891",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2892",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2892",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2893",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2893",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2894",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2894",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2895",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2895",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2896",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2896",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2897",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2897",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2898",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2898",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2899",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2899",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2929",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2929",
"Source": "CVE"
},
{
"RefID": "CVE-2013-2930",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2930",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4270",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4270",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4299",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4299",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4343",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4343",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4345",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4345",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4350",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4350",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4387",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4387",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4470",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4470",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4511",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4511",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4512",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4512",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4513",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4513",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4514",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4514",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4515",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4515",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4516",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4516",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4579",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4579",
"Source": "CVE"
},
{
"RefID": "CVE-2013-4587",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4587",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6367",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6367",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6368",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6368",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6376",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6376",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6378",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6380",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6380",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6381",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6381",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6382",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6382",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6383",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6383",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6431",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6431",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6432",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6432",
"Source": "CVE"
},
{
"RefID": "CVE-2013-6763",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6763",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7026",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7026",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7027",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7027",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7263",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7263",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7264",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7264",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7265",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7265",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7266",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7266",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7267",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7267",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7268",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7268",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7269",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7269",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7270",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7270",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7271",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7271",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7281",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7281",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7339",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7339",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7348",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7348",
"Source": "CVE"
},
{
"RefID": "CVE-2013-7470",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7470",
"Source": "CVE"
},
{
"RefID": "CVE-2014-1438",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1438",
"Source": "CVE"
},
{
"RefID": "CVE-2014-1444",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1444",
"Source": "CVE"
},
{
"RefID": "CVE-2014-1445",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1445",
"Source": "CVE"
},
{
"RefID": "CVE-2014-1446",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1446",
"Source": "CVE"
},
{
"RefID": "CVE-2014-1690",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1690",
"Source": "CVE"
},
{
"RefID": "CVE-2014-2672",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2672",
"Source": "CVE"
},
{
"RefID": "CVE-2014-3645",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3645",
"Source": "CVE"
},
{
"RefID": "CVE-2014-8173",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8173",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9870",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9870",
"Source": "CVE"
},
{
"RefID": "CVE-2014-9895",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9895",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14634",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634",
"Source": "CVE"
},
{
"RefID": "CVE-2018-16885",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16885",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3874",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3874",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1016",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-def to version 3.12.15-alt1. \nSecurity Fix(es):\n\n * BDU:2014-00087: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать локальный отказ в обслуживании\n\n * BDU:2014-00088: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать локальный отказ в обслуживании\n\n * BDU:2014-00089: Уязвимость операционной системы Linux, приводящая к раскрытию информации\n\n * BDU:2014-00091: Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфиденциальной информации из памяти ядра\n\n * BDU:2014-00092: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2014-00093: Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии\n\n * BDU:2014-00094: Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии\n\n * BDU:2014-00095: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2014-00096: Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии\n\n * BDU:2014-00097: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2014-00098: Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии\n\n * BDU:2014-00099: Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии\n\n * BDU:2014-00100: Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфиденциальной информации из памяти ядра\n\n * BDU:2014-00101: Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2015-04307: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04308: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04309: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04310: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2016-02003: Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2016-02026: Уязвимость операционной системы Android, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-02779: Уязвимость функции memcpy_fromiovecend () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01410: Уязвимость буфера сокета SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01630: Уязвимость модуля nf_tables подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * CVE-2013-2888: Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.\n\n * CVE-2013-2889: drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.\n\n * CVE-2013-2890: drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.\n\n * CVE-2013-2891: drivers/hid/hid-steelseries.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_STEELSERIES is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.\n\n * CVE-2013-2892: drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.\n\n * CVE-2013-2893: The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.\n\n * CVE-2013-2894: drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.\n\n * CVE-2013-2895: drivers/hid/hid-logitech-dj.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LOGITECH_DJ is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or obtain sensitive information from kernel memory via a crafted device.\n\n * CVE-2013-2896: drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.\n\n * CVE-2013-2897: Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.\n\n * CVE-2013-2898: drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device.\n\n * CVE-2013-2899: drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.\n\n * CVE-2013-2929: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.\n\n * CVE-2013-2930: The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.\n\n * CVE-2013-4270: The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.\n\n * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.\n\n * CVE-2013-4343: Use-after-free vulnerability in drivers/net/tun.c in the Linux kernel through 3.11.1 allows local users to gain privileges by leveraging the CAP_NET_ADMIN capability and providing an invalid tuntap interface name in a TUNSETIFF ioctl call.\n\n * CVE-2013-4345: Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.\n\n * CVE-2013-4350: The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network.\n\n * CVE-2013-4387: net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.\n\n * CVE-2013-4470: The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.\n\n * CVE-2013-4511: Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.\n\n * CVE-2013-4512: Buffer overflow in the exitcode_proc_write function in arch/um/kernel/exitcode.c in the Linux kernel before 3.12 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging root privileges for a write operation.\n\n * CVE-2013-4513: Buffer overflow in the oz_cdev_write function in drivers/staging/ozwpan/ozcdev.c in the Linux kernel before 3.12 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted write operation.\n\n * CVE-2013-4514: Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.\n\n * CVE-2013-4515: The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.\n\n * CVE-2013-4516: The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.\n\n * CVE-2013-4579: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.\n\n * CVE-2013-4587: Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.\n\n * CVE-2013-6367: The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.\n\n * CVE-2013-6368: The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.\n\n * CVE-2013-6376: The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.\n\n * CVE-2013-6378: The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation.\n\n * CVE-2013-6380: The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.\n\n * CVE-2013-6381: Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.\n\n * CVE-2013-6382: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.\n\n * CVE-2013-6383: The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.\n\n * CVE-2013-6431: The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.\n\n * CVE-2013-6432: The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.\n\n * CVE-2013-6763: The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.\n\n * CVE-2013-7026: Multiple race conditions in ipc/shm.c in the Linux kernel before 3.12.2 allow local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted application that uses shmctl IPC_RMID operations in conjunction with other shm system calls.\n\n * CVE-2013-7027: The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header.\n\n * CVE-2013-7263: The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.\n\n * CVE-2013-7264: The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7265: The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7266: The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7267: The atalk_recvmsg function in net/appletalk/ddp.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7268: The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7269: The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7270: The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7271: The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7281: The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.\n\n * CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.\n\n * CVE-2013-7348: Double free vulnerability in the ioctx_alloc function in fs/aio.c in the Linux kernel before 3.12.4 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via vectors involving an error condition in the aio_setup_ring function.\n\n * CVE-2013-7470: cipso_v4_validate in include/net/cipso_ipv4.h in the Linux kernel before 3.11.7, when CONFIG_NETLABEL is disabled, allows attackers to cause a denial of service (infinite loop and crash), as demonstrated by icmpsic, a different vulnerability than CVE-2013-0310.\n\n * CVE-2014-1438: The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application.\n\n * CVE-2014-1444: The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.\n\n * CVE-2014-1445: The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.\n\n * CVE-2014-1446: The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.\n\n * CVE-2014-1690: The help function in net/netfilter/nf_nat_irc.c in the Linux kernel before 3.12.8 allows remote attackers to obtain sensitive information from kernel memory by establishing an IRC DCC session in which incorrect packet data is transmitted during use of the NAT mangle feature.\n\n * CVE-2014-2672: Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.\n\n * CVE-2014-3645: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.\n\n * CVE-2014-8173: The pmd_none_or_trans_huge_or_clear_bad function in include/asm-generic/pgtable.h in the Linux kernel before 3.13 on NUMA systems does not properly determine whether a Page Middle Directory (PMD) entry is a transparent huge-table entry, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted MADV_WILLNEED madvise system call that leverages the absence of a page-table lock.\n\n * CVE-2014-9870: The Linux kernel before 3.11 on ARM platforms, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly consider user-space access to the TPIDRURW register, which allows local users to gain privileges via a crafted application, aka Android internal bug 28749743 and Qualcomm internal bug CR561044.\n\n * CVE-2014-9895: drivers/media/media-device.c in the Linux kernel before 3.11, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize certain data structures, which allows local users to obtain sensitive information via a crafted application, aka Android internal bug 28750150 and Qualcomm internal bug CR570757, a different vulnerability than CVE-2014-1739.\n\n * CVE-2018-14634: An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.\n\n * CVE-2018-16885: A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7.\n\n * CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.\n\n * CVE-2022-1016: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2014-04-02"
},
"Updated": {
"Date": "2014-04-02"
},
"BDUs": [
{
"ID": "BDU:2014-00087",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2014-00087",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "BDU:2014-00088",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2014-00088",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "BDU:2014-00089",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2014-00089",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "BDU:2014-00091",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2014-00091",
"Impact": "Low",
"Public": "20131024"
},
{
"ID": "BDU:2014-00092",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2014-00092",
"Impact": "Low",
"Public": "20131010"
},
{
"ID": "BDU:2014-00093",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2014-00093",
"Impact": "Low",
"Public": "20131112"
},
{
"ID": "BDU:2014-00094",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2014-00094",
"Impact": "High",
"Public": "20131214"
},
{
"ID": "BDU:2014-00095",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2014-00095",
"Impact": "Low",
"Public": "20131214"
},
{
"ID": "BDU:2014-00096",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2014-00096",
"Impact": "Low",
"Public": "20131126"
},
{
"ID": "BDU:2014-00097",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2014-00097",
"Impact": "Low",
"Public": "20131126"
},
{
"ID": "BDU:2014-00098",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2014-00098",
"Impact": "Low",
"Public": "20131126"
},
{
"ID": "BDU:2014-00099",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2014-00099",
"Impact": "Low",
"Public": "20131126"
},
{
"ID": "BDU:2014-00100",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2014-00100",
"Impact": "Low",
"Public": "20140826"
},
{
"ID": "BDU:2014-00101",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2014-00101",
"Impact": "Low",
"Public": "20140324"
},
{
"ID": "BDU:2015-04307",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-04307",
"Impact": "Critical",
"Public": "20130122"
},
{
"ID": "BDU:2015-04308",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-04308",
"Impact": "Critical"
},
{
"ID": "BDU:2015-04309",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-04309",
"Impact": "Critical"
},
{
"ID": "BDU:2015-04310",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Href": "https://bdu.fstec.ru/vul/2015-04310",
"Impact": "Critical"
},
{
"ID": "BDU:2016-02003",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2016-02003",
"Impact": "Low",
"Public": "20160806"
},
{
"ID": "BDU:2016-02026",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2016-02026",
"Impact": "Critical",
"Public": "20160806"
},
{
"ID": "BDU:2019-02779",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-02779",
"Impact": "Low",
"Public": "20181221"
},
{
"ID": "BDU:2021-01410",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01410",
"Impact": "Low",
"Public": "20190324"
},
{
"ID": "BDU:2022-01630",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-416, CWE-824",
"Href": "https://bdu.fstec.ru/vul/2022-01630",
"Impact": "Low",
"Public": "20220317"
}
],
"CVEs": [
{
"ID": "CVE-2013-2888",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2888",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2889",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2889",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2890",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2890",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2891",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2891",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2892",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2892",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2893",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2893",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2894",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2894",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2895",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2895",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2896",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2896",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2897",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2897",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2898",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2898",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2899",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2899",
"Impact": "Low",
"Public": "20130916"
},
{
"ID": "CVE-2013-2929",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2929",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "CVE-2013-2930",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2930",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "CVE-2013-4270",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4270",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "CVE-2013-4299",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4299",
"Impact": "Low",
"Public": "20131024"
},
{
"ID": "CVE-2013-4343",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4343",
"Impact": "Low",
"Public": "20130925"
},
{
"ID": "CVE-2013-4345",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4345",
"Impact": "Low",
"Public": "20131010"
},
{
"ID": "CVE-2013-4350",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4350",
"Impact": "Low",
"Public": "20130925"
},
{
"ID": "CVE-2013-4387",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4387",
"Impact": "Low",
"Public": "20131010"
},
{
"ID": "CVE-2013-4470",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4470",
"Impact": "Low",
"Public": "20131104"
},
{
"ID": "CVE-2013-4511",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4511",
"Impact": "Low",
"Public": "20131112"
},
{
"ID": "CVE-2013-4512",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4512",
"Impact": "Low",
"Public": "20131112"
},
{
"ID": "CVE-2013-4513",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4513",
"Impact": "Low",
"Public": "20131112"
},
{
"ID": "CVE-2013-4514",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4514",
"Impact": "Low",
"Public": "20131112"
},
{
"ID": "CVE-2013-4515",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4515",
"Impact": "Low",
"Public": "20131112"
},
{
"ID": "CVE-2013-4516",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4516",
"Impact": "Low",
"Public": "20131112"
},
{
"ID": "CVE-2013-4579",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4579",
"Impact": "Low",
"Public": "20131120"
},
{
"ID": "CVE-2013-4587",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4587",
"Impact": "High",
"Public": "20131214"
},
{
"ID": "CVE-2013-6367",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6367",
"Impact": "Low",
"Public": "20131214"
},
{
"ID": "CVE-2013-6368",
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6368",
"Impact": "Low",
"Public": "20131214"
},
{
"ID": "CVE-2013-6376",
"CVSS": "AV:A/AC:M/Au:S/C:N/I:N/A:C",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6376",
"Impact": "Low",
"Public": "20131214"
},
{
"ID": "CVE-2013-6378",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6378",
"Impact": "Low",
"Public": "20131127"
},
{
"ID": "CVE-2013-6380",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6380",
"Impact": "Low",
"Public": "20131127"
},
{
"ID": "CVE-2013-6381",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6381",
"Impact": "Low",
"Public": "20131127"
},
{
"ID": "CVE-2013-6382",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6382",
"Impact": "Low",
"Public": "20131127"
},
{
"ID": "CVE-2013-6383",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6383",
"Impact": "Low",
"Public": "20131127"
},
{
"ID": "CVE-2013-6431",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6431",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "CVE-2013-6432",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6432",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "CVE-2013-6763",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6763",
"Impact": "Low",
"Public": "20131112"
},
{
"ID": "CVE-2013-7026",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7026",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "CVE-2013-7027",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7027",
"Impact": "Low",
"Public": "20131209"
},
{
"ID": "CVE-2013-7263",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7263",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7264",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7264",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7265",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7265",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7266",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7266",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7267",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7267",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7268",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7268",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7269",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7269",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7270",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7270",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7271",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7271",
"Impact": "Low",
"Public": "20140106"
},
{
"ID": "CVE-2013-7281",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7281",
"Impact": "Low",
"Public": "20140108"
},
{
"ID": "CVE-2013-7339",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7339",
"Impact": "Low",
"Public": "20140324"
},
{
"ID": "CVE-2013-7348",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7348",
"Impact": "Low",
"Public": "20140401"
},
{
"ID": "CVE-2013-7470",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7470",
"Impact": "Low",
"Public": "20190423"
},
{
"ID": "CVE-2014-1438",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1438",
"Impact": "Low",
"Public": "20140118"
},
{
"ID": "CVE-2014-1444",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1444",
"Impact": "Low",
"Public": "20140118"
},
{
"ID": "CVE-2014-1445",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1445",
"Impact": "Low",
"Public": "20140118"
},
{
"ID": "CVE-2014-1446",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1446",
"Impact": "Low",
"Public": "20140118"
},
{
"ID": "CVE-2014-1690",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1690",
"Impact": "Low",
"Public": "20140228"
},
{
"ID": "CVE-2014-2672",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2672",
"Impact": "High",
"Public": "20140401"
},
{
"ID": "CVE-2014-3645",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3645",
"Impact": "Low",
"Public": "20141110"
},
{
"ID": "CVE-2014-8173",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8173",
"Impact": "High",
"Public": "20150316"
},
{
"ID": "CVE-2014-9870",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9870",
"Impact": "High",
"Public": "20160806"
},
{
"ID": "CVE-2014-9895",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9895",
"Impact": "Low",
"Public": "20160806"
},
{
"ID": "CVE-2018-14634",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634",
"Impact": "High",
"Public": "20180925"
},
{
"ID": "CVE-2018-16885",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16885",
"Impact": "Low",
"Public": "20190103"
},
{
"ID": "CVE-2019-3874",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3874",
"Impact": "Low",
"Public": "20190325"
},
{
"ID": "CVE-2022-1016",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016",
"Impact": "Low",
"Public": "20220829"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20141422001",
"Comment": "kernel-doc-std is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422002",
"Comment": "kernel-headers-modules-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422003",
"Comment": "kernel-headers-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422004",
"Comment": "kernel-image-domU-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422005",
"Comment": "kernel-image-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422006",
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422007",
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422008",
"Comment": "kernel-modules-drm-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422009",
"Comment": "kernel-modules-ide-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422010",
"Comment": "kernel-modules-kvm-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422011",
"Comment": "kernel-modules-staging-std-def is earlier than 1:3.12.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141422012",
"Comment": "kernel-modules-v4l-std-def is earlier than 1:3.12.15-alt1"
}
]
}
]
}
}
]
}