567 lines
30 KiB
JSON
567 lines
30 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20151186",
|
|
"Version": "oval:org.altlinux.errata:def:20151186",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2015-1186: package `kernel-image-un-def` update to version 3.19.0-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2015-1186",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1186",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09825",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09825",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09826",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09826",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09827",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09827",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09828",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09828",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09829",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09829",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09830",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09830",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09831",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09831",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09832",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09832",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09833",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09833",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09834",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09834",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09835",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09835",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09836",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09836",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09837",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09837",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09838",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09838",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09846",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09846",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09847",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09847",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01159",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01159",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01160",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01160",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-9710",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9710",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-9940",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9940",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0571",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0571",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1328",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1328",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1420",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1420",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1421",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1421",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1465",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1465",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1593",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1593",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2041",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2041",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2042",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2042",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3288",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3288",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4167",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4167",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8215",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8215",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-9004",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-9004",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-15868",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15868",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-16995",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16995",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades kernel-image-un-def to version 3.19.0-alt1. \nSecurity Fix(es):\n\n * BDU:2015-09825: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09826: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09827: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09828: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09829: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09830: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09831: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09832: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09833: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09834: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09835: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09836: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09837: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09838: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09846: Уязвимости операционной системы Ubuntu, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09847: Уязвимости операционной системы Ubuntu, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2017-01159: Уязвимость компонента kernel/events/core.c ядра операционной системы Android, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2017-01160: Уязвимость компонента drivers/regulator/core.c ядра операционной системы Android, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * CVE-2014-9710: The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit.\n\n * CVE-2014-9940: The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.\n\n * CVE-2015-0571: The WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not verify authorization for private SET IOCTL calls, which allows attackers to gain privileges via a crafted application, related to wlan_hdd_hostapd.c and wlan_hdd_wext.c.\n\n * CVE-2015-1328: The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.\n\n * CVE-2015-1420: Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.\n\n * CVE-2015-1421: Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.\n\n * CVE-2015-1465: The IPv4 implementation in the Linux kernel before 3.18.8 does not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allows remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets.\n\n * CVE-2015-1593: The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.\n\n * CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.\n\n * CVE-2015-2042: net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.\n\n * CVE-2015-3288: mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.\n\n * CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.\n\n * CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.\n\n * CVE-2015-9004: kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions.\n\n * CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.\n\n * CVE-2019-16995: In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2015-02-17"
|
|
},
|
|
"Updated": {
|
|
"Date": "2015-02-17"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-09825",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09825",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09826",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09826",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09827",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09827",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09828",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09828",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09829",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09829",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09830",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09830",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09831",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09831",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09832",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09832",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09833",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09833",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09834",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09834",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09835",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09835",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09836",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09836",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09837",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09837",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09838",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09838",
|
|
"Impact": "Critical",
|
|
"Public": "20150326"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09846",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09846",
|
|
"Impact": "Critical",
|
|
"Public": "20150324"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09847",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09847",
|
|
"Impact": "Critical",
|
|
"Public": "20150324"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01159",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01159",
|
|
"Impact": "Critical",
|
|
"Public": "20170503"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01160",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01160",
|
|
"Impact": "High",
|
|
"Public": "20170503"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2014-9710",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9710",
|
|
"Impact": "Low",
|
|
"Public": "20150527"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-9940",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9940",
|
|
"Impact": "High",
|
|
"Public": "20170502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0571",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-862",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0571",
|
|
"Impact": "High",
|
|
"Public": "20160509"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1328",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1328",
|
|
"Impact": "High",
|
|
"Public": "20161128"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1420",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1420",
|
|
"Impact": "Low",
|
|
"Public": "20150316"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1421",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1421",
|
|
"Impact": "Critical",
|
|
"Public": "20150316"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1465",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1465",
|
|
"Impact": "High",
|
|
"Public": "20150405"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1593",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1593",
|
|
"Impact": "Low",
|
|
"Public": "20150316"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2041",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2041",
|
|
"Impact": "Low",
|
|
"Public": "20150421"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2042",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2042",
|
|
"Impact": "Low",
|
|
"Public": "20150421"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3288",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3288",
|
|
"Impact": "High",
|
|
"Public": "20161016"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4167",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4167",
|
|
"Impact": "Low",
|
|
"Public": "20150805"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8215",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8215",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-9004",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-9004",
|
|
"Impact": "High",
|
|
"Public": "20170502"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-15868",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15868",
|
|
"Impact": "High",
|
|
"Public": "20171205"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-16995",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-401",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16995",
|
|
"Impact": "High",
|
|
"Public": "20190930"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186001",
|
|
"Comment": "kernel-doc-un is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186002",
|
|
"Comment": "kernel-headers-modules-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186003",
|
|
"Comment": "kernel-headers-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186004",
|
|
"Comment": "kernel-image-domU-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186005",
|
|
"Comment": "kernel-image-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186006",
|
|
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186007",
|
|
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186008",
|
|
"Comment": "kernel-modules-drm-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186009",
|
|
"Comment": "kernel-modules-ide-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186010",
|
|
"Comment": "kernel-modules-kvm-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186011",
|
|
"Comment": "kernel-modules-staging-un-def is earlier than 1:3.19.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151186012",
|
|
"Comment": "kernel-modules-v4l-un-def is earlier than 1:3.19.0-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |