444 lines
23 KiB
JSON
444 lines
23 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20212671",
|
||
"Version": "oval:org.altlinux.errata:def:20212671",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-2671: package `kernel-image-rt` update to version 4.19.199-alt1.rt86",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-2671",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2671",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02182",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02182",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02663",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02663",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03088",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03088",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03095",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03095",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03177",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03177",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03848",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03848",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03938",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03938",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04028",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04028",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04260",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04260",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03028",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03028",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03139",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03139",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-04604",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-04604",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01796",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01796",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-24586",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-24587",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-24588",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-25670",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25670",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-25671",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25671",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-26147",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-22555",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-29154",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-33909",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-35039",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-35039",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-37576",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4157",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-28772",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28772",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-rt to version 4.19.199-alt1.rt86. \nSecurity Fix(es):\n\n * BDU:2021-02182: Уязвимость компонента BPF JIT (arch/x86/net/bpf_jit_comp.c и arch/x86/net/bpf_jit_comp32.c.) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-02663: Уязвимость набора стандартов связи для коммуникации IEEE 802.11 операционной системы Windows, позволяющая нарушителю внедрить произвольные сетевые пакеты\n\n * BDU:2021-03088: Уязвимость реализации алгоритмов WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03095: Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю внедрить произвольные сетевые пакеты и/или оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03177: Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03848: Уязвимость компонента fs/seq_file.c ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-03938: Уязвимость компонента kernel/module.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-04028: Уязвимость функции rtas_args.nargs драйвера arch/powerpc/kvm/book3s_rtas.c ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение памяти операционной системы хоста\n\n * BDU:2021-04260: Уязвимость функции xt_compat_target_from_user() (net/netfilter/x_tables.c) подсистемы netfilter операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-03028: Уязвимость функции llcp_sock_connect() операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2022-03139: Уязвимость функции llcp_sock_bind() протокола nfc ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-04604: Уязвимость функции decode_nfs_fh() ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и вызвать аварийное завершение системы\n\n * BDU:2023-01796: Уязвимость функции seq_buf_putmem_hex() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.\n\n * CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.\n\n * CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.\n\n * CVE-2020-25670: A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.\n\n * CVE-2020-25671: A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.\n\n * CVE-2020-26147: An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.\n\n * CVE-2021-22555: A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space\n\n * CVE-2021-29154: BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.\n\n * CVE-2021-33909: fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.\n\n * CVE-2021-35039: kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.\n\n * CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.\n\n * CVE-2021-4157: An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.\n\n * CVE-2023-28772: An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-08-31"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-08-31"
|
||
},
|
||
"bdu": [
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-77",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02182",
|
||
"Impact": "High",
|
||
"Public": "20210408",
|
||
"CveID": "BDU:2021-02182"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-306",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02663",
|
||
"Impact": "Low",
|
||
"Public": "20210511",
|
||
"CveID": "BDU:2021-02663"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"Cwe": "CWE-326",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03088",
|
||
"Impact": "Low",
|
||
"Public": "20210511",
|
||
"CveID": "BDU:2021-03088"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
|
||
"Cvss3": "AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"Cwe": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03095",
|
||
"Impact": "Low",
|
||
"Public": "20210511",
|
||
"CveID": "BDU:2021-03095"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:M/Au:N/C:N/I:C/A:N",
|
||
"Cvss3": "AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"Cwe": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03177",
|
||
"Impact": "Low",
|
||
"Public": "20210511",
|
||
"CveID": "BDU:2021-03177"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03848",
|
||
"Impact": "High",
|
||
"Public": "20210720",
|
||
"CveID": "BDU:2021-03848"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-347",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03938",
|
||
"Impact": "High",
|
||
"Public": "20210622",
|
||
"CveID": "BDU:2021-03938"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04028",
|
||
"Impact": "High",
|
||
"Public": "20210726",
|
||
"CveID": "BDU:2021-04028"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04260",
|
||
"Impact": "High",
|
||
"Public": "20210406",
|
||
"CveID": "BDU:2021-04260"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03028",
|
||
"Impact": "High",
|
||
"Public": "20210415",
|
||
"CveID": "BDU:2022-03028"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03139",
|
||
"Impact": "High",
|
||
"Public": "20210526",
|
||
"CveID": "BDU:2022-03139"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-04604",
|
||
"Impact": "High",
|
||
"Public": "20211220",
|
||
"CveID": "BDU:2022-04604"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01796",
|
||
"Impact": "Low",
|
||
"Public": "20230323",
|
||
"CveID": "BDU:2023-01796"
|
||
}
|
||
],
|
||
"Cves": [
|
||
{
|
||
"Cvss": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"Cwe": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
|
||
"Impact": "Low",
|
||
"Public": "20210511",
|
||
"CveID": "CVE-2020-24586"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"Cwe": "CWE-327",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
|
||
"Impact": "Low",
|
||
"Public": "20210511",
|
||
"CveID": "CVE-2020-24587"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"Cwe": "CWE-327",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
|
||
"Impact": "Low",
|
||
"Public": "20210511",
|
||
"CveID": "CVE-2020-24588"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25670",
|
||
"Impact": "High",
|
||
"Public": "20210526",
|
||
"CveID": "CVE-2020-25670"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25671",
|
||
"Impact": "High",
|
||
"Public": "20210526",
|
||
"CveID": "CVE-2020-25671"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:H/Au:N/C:P/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
|
||
"Cwe": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
|
||
"Impact": "Low",
|
||
"Public": "20210511",
|
||
"CveID": "CVE-2020-26147"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
|
||
"Impact": "High",
|
||
"Public": "20210707",
|
||
"CveID": "CVE-2021-22555"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-77",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
|
||
"Impact": "High",
|
||
"Public": "20210408",
|
||
"CveID": "CVE-2021-29154"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
|
||
"Impact": "High",
|
||
"Public": "20210720",
|
||
"CveID": "CVE-2021-33909"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-347",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-35039",
|
||
"Impact": "High",
|
||
"Public": "20210707",
|
||
"CveID": "CVE-2021-35039"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
|
||
"Impact": "High",
|
||
"Public": "20210726",
|
||
"CveID": "CVE-2021-37576"
|
||
},
|
||
{
|
||
"Cvss": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
|
||
"Impact": "High",
|
||
"Public": "20220325",
|
||
"CveID": "CVE-2021-4157"
|
||
},
|
||
{
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28772",
|
||
"Impact": "Low",
|
||
"Public": "20230323",
|
||
"CveID": "CVE-2023-28772"
|
||
}
|
||
],
|
||
"AffectedCpeList": {
|
||
"Cpe": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212671001",
|
||
"Comment": "kernel-headers-modules-rt is earlier than 0:4.19.199-alt1.rt86"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212671002",
|
||
"Comment": "kernel-headers-rt is earlier than 0:4.19.199-alt1.rt86"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212671003",
|
||
"Comment": "kernel-image-rt is earlier than 0:4.19.199-alt1.rt86"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |