vuln-list-alt/oval/c9f2/ALT-PU-2020-2153/definitions.json
2024-06-28 13:17:52 +00:00

863 lines
46 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202153",
"Version": "oval:org.altlinux.errata:def:20202153",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2153: package `kernel-image-mp` update to version 5.6.16-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2153",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2153",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-02134",
"RefURL": "https://bdu.fstec.ru/vul/2020-02134",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02136",
"RefURL": "https://bdu.fstec.ru/vul/2020-02136",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02141",
"RefURL": "https://bdu.fstec.ru/vul/2020-02141",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02142",
"RefURL": "https://bdu.fstec.ru/vul/2020-02142",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02286",
"RefURL": "https://bdu.fstec.ru/vul/2020-02286",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02416",
"RefURL": "https://bdu.fstec.ru/vul/2020-02416",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02426",
"RefURL": "https://bdu.fstec.ru/vul/2020-02426",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02428",
"RefURL": "https://bdu.fstec.ru/vul/2020-02428",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02430",
"RefURL": "https://bdu.fstec.ru/vul/2020-02430",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02431",
"RefURL": "https://bdu.fstec.ru/vul/2020-02431",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02432",
"RefURL": "https://bdu.fstec.ru/vul/2020-02432",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03027",
"RefURL": "https://bdu.fstec.ru/vul/2020-03027",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03359",
"RefURL": "https://bdu.fstec.ru/vul/2020-03359",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03362",
"RefURL": "https://bdu.fstec.ru/vul/2020-03362",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03819",
"RefURL": "https://bdu.fstec.ru/vul/2020-03819",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05550",
"RefURL": "https://bdu.fstec.ru/vul/2020-05550",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05551",
"RefURL": "https://bdu.fstec.ru/vul/2020-05551",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05792",
"RefURL": "https://bdu.fstec.ru/vul/2020-05792",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05886",
"RefURL": "https://bdu.fstec.ru/vul/2020-05886",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05902",
"RefURL": "https://bdu.fstec.ru/vul/2020-05902",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00466",
"RefURL": "https://bdu.fstec.ru/vul/2021-00466",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00471",
"RefURL": "https://bdu.fstec.ru/vul/2021-00471",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01200",
"RefURL": "https://bdu.fstec.ru/vul/2021-01200",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01920",
"RefURL": "https://bdu.fstec.ru/vul/2021-01920",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02578",
"RefURL": "https://bdu.fstec.ru/vul/2021-02578",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00997",
"RefURL": "https://bdu.fstec.ru/vul/2022-00997",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01501",
"RefURL": "https://bdu.fstec.ru/vul/2022-01501",
"Source": "BDU"
},
{
"RefID": "BDU:2022-04677",
"RefURL": "https://bdu.fstec.ru/vul/2022-04677",
"Source": "BDU"
},
{
"RefID": "CVE-2019-20794",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20794",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20810",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20810",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11494",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11494",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11565",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11608",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11609",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11668",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11725",
"Source": "CVE"
},
{
"RefID": "CVE-2020-11884",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-11884",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12464",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12655",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12656",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12657",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12657",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12659",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12768",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12768",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12770",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12771",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12771",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12826",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12888",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888",
"Source": "CVE"
},
{
"RefID": "CVE-2020-13143",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-13143",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14381",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29372",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29372",
"Source": "CVE"
},
{
"RefID": "CVE-2020-29373",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29373",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36516",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36516",
"Source": "CVE"
},
{
"RefID": "CVE-2020-36557",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36557",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1419",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1419",
"Source": "CVE"
},
{
"RefID": "CVE-2022-25636",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-mp to version 5.6.16-alt1. \nSecurity Fix(es):\n\n * BDU:2020-02134: Уязвимость функций ov511_mode_init_regs и ov518_mode_init_regs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02136: Уязвимость USB-драйвера камеры Xirlink (drivers/media/usb/gspca/xirlink_cit.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации и вызвать отказ в обслуживании\n\n * BDU:2020-02141: Уязвимость ядра операционной системы Linux, связанная с записью за границами буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02142: Уязвимость функции bfq_idle_slice_timer_body (block/bfq-iosched.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02286: Уязвимость функции mpol_parse_str (mm/mempolicy.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2020-02416: Уязвимость подсистемы stv06xx ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02426: Уязвимость функции usb_sg_cancel (drivers/usb/core/message.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-02428: Уязвимость реализации файловой системы FUSE ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02430: Уязвимость функции svm_cpu_uninit (arch/x86/kvm/svm.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02431: Уязвимость функции sg_write ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-02432: Уязвимость функции btree_gc_coalesce (drivers/md/bcache/btree.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03027: Уязвимость функции go7007_snd_init() (drivers/media/usb/go7007/snd-go7007.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03359: Уязвимость функции xfs_agf_verify файловой системы XFS ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03362: Уязвимость функции gss_mech_free ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2020-03819: Уязвимость функции enable_sacf_uaccess ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05550: Уязвимость функции do_madvise (mm/madvise.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05551: Уязвимость компонента Filesystem Handler ядра операционных систем Linux, позволяющая нарушителю оказать влияние на целостность и конфиденциальность данных\n\n * BDU:2020-05792: Уязвимость реализации futex ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-05886: Уязвимость gadget_dev_desc_UDC_store в драйверах / usb / gadget / configfs.c (bsc # 1171982) ядра операционной системы Linux, связанная с чтением за границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05902: Уязвимость ядра операционной системы Linux, связанная с раскрытием информации, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2021-00466: Уязвимость функции exec_id ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-00471: Уязвимость драйвера VFIO PCI ядра операционной системы Linux, связанная с недостаточной обработкой исключительных состояний, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01200: Уязвимость функции slc_bump (drivers/net/can/slcan.c) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-01920: Уязвимость реализации протокола MIDI ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-02578: Уязвимость функции snd_ctl_elem_add ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00997: Уязвимость функции nft_fwd_dup_netdev_offload() подсистемы netfilter ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * BDU:2022-01501: Уязвимость реализации протокола TCP ядра операционных систем Linux, позволяющая нарушителю провести атаку типа «человек посередине»\n\n * BDU:2022-04677: Уязвимость реализации вызова VT_DISALLOCATE ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-20794: An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.\n\n * CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.\n\n * CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.\n\n * CVE-2020-11565: An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue “is a bug in parsing mount options which can only be specified by a privileged user, so triggering the bug does not grant any powers not already held.”\n\n * CVE-2020-11608: An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.\n\n * CVE-2020-11609: An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.\n\n * CVE-2020-11668: In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.\n\n * CVE-2020-11725: snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info-\u003eowner line, which later affects a private_size*count multiplication for unspecified \"interesting side effects.\" NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info-\u003eowner field to represent data unrelated to the \"owner\" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, have been designed to misuse the info-\u003eowner field in a safe way\n\n * CVE-2020-11884: In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.\n\n * CVE-2020-12464: usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.\n\n * CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.\n\n * CVE-2020-12656: gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug\n\n * CVE-2020-12657: An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.\n\n * CVE-2020-12659: An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.\n\n * CVE-2020-12768: An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it's a one-time leak at the boot, the size is negligible, and it can't be triggered at will\n\n * CVE-2020-12770: An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.\n\n * CVE-2020-12771: An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.\n\n * CVE-2020-12826: A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.\n\n * CVE-2020-12888: The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.\n\n * CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.\n\n * CVE-2020-14381: A flaw was found in the Linux kernels futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2020-27786: A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2020-29372: An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. There is a race condition between coredump operations and the IORING_OP_MADVISE implementation, aka CID-bc0c4d1e176e.\n\n * CVE-2020-29373: An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.\n\n * CVE-2020-36516: An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.\n\n * CVE-2020-36557: A race condition in the Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free.\n\n * CVE-2022-1419: The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.\n\n * CVE-2022-25636: net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-06-09"
},
"Updated": {
"Date": "2020-06-09"
},
"BDUs": [
{
"ID": "BDU:2020-02134",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-02134",
"Impact": "Low",
"Public": "20200312"
},
{
"ID": "BDU:2020-02136",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-02136",
"Impact": "High",
"Public": "20200312"
},
{
"ID": "BDU:2020-02141",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-02141",
"Impact": "High",
"Public": "20200415"
},
{
"ID": "BDU:2020-02142",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02142",
"Impact": "High",
"Public": "20200321"
},
{
"ID": "BDU:2020-02286",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-02286",
"Impact": "Low",
"Public": "20200402"
},
{
"ID": "BDU:2020-02416",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-02416",
"Impact": "Low",
"Public": "20200312"
},
{
"ID": "BDU:2020-02426",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02426",
"Impact": "Low",
"Public": "20200416"
},
{
"ID": "BDU:2020-02428",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-02428",
"Impact": "Low",
"Public": "20200509"
},
{
"ID": "BDU:2020-02430",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401, CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-02430",
"Impact": "Low",
"Public": "20200221"
},
{
"ID": "BDU:2020-02431",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02431",
"Impact": "Low",
"Public": "20200414"
},
{
"ID": "BDU:2020-02432",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-667",
"Href": "https://bdu.fstec.ru/vul/2020-02432",
"Impact": "Low",
"Public": "20200508"
},
{
"ID": "BDU:2020-03027",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401, CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-03027",
"Impact": "Low",
"Public": "20191213"
},
{
"ID": "BDU:2020-03359",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-400, CWE-835",
"Href": "https://bdu.fstec.ru/vul/2020-03359",
"Impact": "Low",
"Public": "20200302"
},
{
"ID": "BDU:2020-03362",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401, CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-03362",
"Impact": "Low",
"Public": "20200504"
},
{
"ID": "BDU:2020-03819",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-03819",
"Impact": "High",
"Public": "20200421"
},
{
"ID": "BDU:2020-05550",
"CVSS": "AV:L/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-05550",
"Impact": "Low",
"Public": "20200424"
},
{
"ID": "BDU:2020-05551",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2020-05551",
"Impact": "High",
"Public": "20200208"
},
{
"ID": "BDU:2020-05792",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-05792",
"Impact": "High",
"Public": "20200306"
},
{
"ID": "BDU:2020-05886",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-05886",
"Impact": "Low",
"Public": "20200515"
},
{
"ID": "BDU:2020-05902",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-05902",
"Impact": "Low",
"Public": "20200402"
},
{
"ID": "BDU:2021-00466",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2021-00466",
"Impact": "Low",
"Public": "20200401"
},
{
"ID": "BDU:2021-00471",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-755",
"Href": "https://bdu.fstec.ru/vul/2021-00471",
"Impact": "Low",
"Public": "20200514"
},
{
"ID": "BDU:2021-01200",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-908, CWE-909",
"Href": "https://bdu.fstec.ru/vul/2021-01200",
"Impact": "Low",
"Public": "20200401"
},
{
"ID": "BDU:2021-01920",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01920",
"Impact": "High",
"Public": "20200507"
},
{
"ID": "BDU:2021-02578",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2021-02578",
"Impact": "Low",
"Public": "20200412"
},
{
"ID": "BDU:2022-00997",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00997",
"Impact": "High",
"Public": "20220220"
},
{
"ID": "BDU:2022-01501",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"CWE": "CWE-74, CWE-287, CWE-327",
"Href": "https://bdu.fstec.ru/vul/2022-01501",
"Impact": "High",
"Public": "20201102"
},
{
"ID": "BDU:2022-04677",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-04677",
"Impact": "Critical",
"Public": "20200327"
}
],
"CVEs": [
{
"ID": "CVE-2019-20794",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20794",
"Impact": "Low",
"Public": "20200509"
},
{
"ID": "CVE-2019-20810",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20810",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-11494",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11494",
"Impact": "Low",
"Public": "20200402"
},
{
"ID": "CVE-2020-11565",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565",
"Impact": "Low",
"Public": "20200406"
},
{
"ID": "CVE-2020-11608",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608",
"Impact": "Low",
"Public": "20200407"
},
{
"ID": "CVE-2020-11609",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11609",
"Impact": "Low",
"Public": "20200407"
},
{
"ID": "CVE-2020-11668",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
"Impact": "High",
"Public": "20200409"
},
{
"ID": "CVE-2020-11725",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11725",
"Impact": "High",
"Public": "20200412"
},
{
"ID": "CVE-2020-11884",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-11884",
"Impact": "High",
"Public": "20200429"
},
{
"ID": "CVE-2020-12464",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464",
"Impact": "Low",
"Public": "20200429"
},
{
"ID": "CVE-2020-12655",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655",
"Impact": "Low",
"Public": "20200505"
},
{
"ID": "CVE-2020-12656",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12656",
"Impact": "Low",
"Public": "20200505"
},
{
"ID": "CVE-2020-12657",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12657",
"Impact": "High",
"Public": "20200505"
},
{
"ID": "CVE-2020-12659",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659",
"Impact": "Low",
"Public": "20200505"
},
{
"ID": "CVE-2020-12768",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12768",
"Impact": "Low",
"Public": "20200509"
},
{
"ID": "CVE-2020-12770",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770",
"Impact": "Low",
"Public": "20200509"
},
{
"ID": "CVE-2020-12771",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12771",
"Impact": "Low",
"Public": "20200509"
},
{
"ID": "CVE-2020-12826",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826",
"Impact": "Low",
"Public": "20200512"
},
{
"ID": "CVE-2020-12888",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888",
"Impact": "Low",
"Public": "20200515"
},
{
"ID": "CVE-2020-13143",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-13143",
"Impact": "Low",
"Public": "20200518"
},
{
"ID": "CVE-2020-14381",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381",
"Impact": "High",
"Public": "20201203"
},
{
"ID": "CVE-2020-27786",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786",
"Impact": "High",
"Public": "20201211"
},
{
"ID": "CVE-2020-29372",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29372",
"Impact": "Low",
"Public": "20201128"
},
{
"ID": "CVE-2020-29373",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29373",
"Impact": "Low",
"Public": "20201128"
},
{
"ID": "CVE-2020-36516",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L",
"CWE": "CWE-327",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36516",
"Impact": "Low",
"Public": "20220226"
},
{
"ID": "CVE-2020-36557",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36557",
"Impact": "Low",
"Public": "20220721"
},
{
"ID": "CVE-2022-1419",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1419",
"Impact": "High",
"Public": "20220602"
},
{
"ID": "CVE-2022-25636",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636",
"Impact": "High",
"Public": "20220224"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202153001",
"Comment": "kernel-headers-modules-mp is earlier than 0:5.6.16-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202153002",
"Comment": "kernel-headers-mp is earlier than 0:5.6.16-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202153003",
"Comment": "kernel-image-mp is earlier than 0:5.6.16-alt1"
}
]
}
]
}
}
]
}