502 lines
27 KiB
JSON
502 lines
27 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20201145",
|
||
"Version": "oval:org.altlinux.errata:def:20201145",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2020-1145: package `kernel-image-un-def` update to version 5.5.1-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p11"
|
||
],
|
||
"Products": [
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2020-1145",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1145",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00850",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00850",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-04797",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-04797",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02663",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02663",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03057",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03057",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03088",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03088",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03095",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03095",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03177",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03177",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04836",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04836",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04847",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04847",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07336",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07336",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00629",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00629",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01200",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01200",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02532",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02532",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-19338",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19338",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10690",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10732",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-12351",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-24586",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-24587",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-24588",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-26147",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-8428",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8428",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20239",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3635",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41858",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4378",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0459",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0461",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-un-def to version 5.5.1-alt1. \nSecurity Fix(es):\n\n * BDU:2020-00850: Уязвимость функции fs/namei.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04797: Уязвимость компонента net/bluetooth/l2cap_core.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-02663: Уязвимость набора стандартов связи для коммуникации IEEE 802.11 операционной системы Windows, позволяющая нарушителю внедрить произвольные сетевые пакеты\n\n * BDU:2021-03057: Уязвимость функции fill_thread_core_info() ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию и вызвать отказ в обслуживании\n\n * BDU:2021-03088: Уязвимость реализации алгоритмов WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03095: Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю внедрить произвольные сетевые пакеты и/или оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03177: Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-04836: Уязвимость ядра операционной системы Linux , связанная с раскрытием защищаемой информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-04847: Уязвимость реализации netfilter ядра операционной системы Linux вызвана переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07336: Уязвимость функции __do_proc_dointvec ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2023-00629: Уязвимость функции sl_tx_timeout() в модуле drivers/net/slip.c драйвера SLIP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01200: Уязвимость реализации протокола Upper Level Protocol (ULP) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2023-02532: Уязвимость функции _copy_from_user() в модуле lib/usercopy.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2019-19338: A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.\n\n * CVE-2020-10690: There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.\n\n * CVE-2020-10732: A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.\n\n * CVE-2020-12351: Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.\n\n * CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.\n\n * CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.\n\n * CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.\n\n * CVE-2020-26147: An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.\n\n * CVE-2020-8428: fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.\n\n * CVE-2021-20239: A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.\n\n * CVE-2021-3635: A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.\n\n * CVE-2022-41858: A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.\n\n * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n * CVE-2023-0459: Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47\n\n * CVE-2023-0461: There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2020-02-06"
|
||
},
|
||
"Updated": {
|
||
"Date": "2020-02-06"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2020-00850",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00850",
|
||
"Impact": "High",
|
||
"Public": "20200126"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-04797",
|
||
"CVSS": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20, CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-04797",
|
||
"Impact": "High",
|
||
"Public": "20200925"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-02663",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-306, CWE-327",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02663",
|
||
"Impact": "Low",
|
||
"Public": "20210510"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03057",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
|
||
"CWE": "CWE-200, CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03057",
|
||
"Impact": "Low",
|
||
"Public": "20200528"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03088",
|
||
"CVSS": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-326, CWE-327",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03088",
|
||
"Impact": "Low",
|
||
"Public": "20210510"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03095",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03095",
|
||
"Impact": "Low",
|
||
"Public": "20210510"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03177",
|
||
"CVSS": "AV:A/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03177",
|
||
"Impact": "Low",
|
||
"Public": "20210510"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04836",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-119, CWE-200, CWE-822",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04836",
|
||
"Impact": "Low",
|
||
"Public": "20210528"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04847",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04847",
|
||
"Impact": "Low",
|
||
"Public": "20200116"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07336",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-474",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07336",
|
||
"Impact": "High",
|
||
"Public": "20221116"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00629",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00629",
|
||
"Impact": "High",
|
||
"Public": "20220406"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01200",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01200",
|
||
"Impact": "High",
|
||
"Public": "20230104"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-02532",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200, CWE-203, CWE-264, CWE-763",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02532",
|
||
"Impact": "Low",
|
||
"Public": "20230221"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2019-19338",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19338",
|
||
"Impact": "Low",
|
||
"Public": "20200713"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10690",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690",
|
||
"Impact": "Low",
|
||
"Public": "20200508"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10732",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
|
||
"Impact": "Low",
|
||
"Public": "20200612"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-12351",
|
||
"CVSS": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351",
|
||
"Impact": "High",
|
||
"Public": "20201123"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-24586",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
|
||
"Impact": "Low",
|
||
"Public": "20210511"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-24587",
|
||
"CVSS": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-327",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
|
||
"Impact": "Low",
|
||
"Public": "20210511"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-24588",
|
||
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-327",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
|
||
"Impact": "Low",
|
||
"Public": "20210511"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-26147",
|
||
"CVSS": "AV:A/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
|
||
"Impact": "Low",
|
||
"Public": "20210511"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-8428",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8428",
|
||
"Impact": "High",
|
||
"Public": "20200129"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20239",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
|
||
"Impact": "Low",
|
||
"Public": "20210528"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3635",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
|
||
"Impact": "Low",
|
||
"Public": "20210813"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41858",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858",
|
||
"Impact": "High",
|
||
"Public": "20230117"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4378",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378",
|
||
"Impact": "High",
|
||
"Public": "20230105"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0459",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-763",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
|
||
"Impact": "Low",
|
||
"Public": "20230525"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-0461",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461",
|
||
"Impact": "High",
|
||
"Public": "20230228"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:container:11"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145001",
|
||
"Comment": "kernel-doc-un is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145002",
|
||
"Comment": "kernel-headers-modules-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145003",
|
||
"Comment": "kernel-headers-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145004",
|
||
"Comment": "kernel-image-domU-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145005",
|
||
"Comment": "kernel-image-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145006",
|
||
"Comment": "kernel-modules-drm-ancient-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145007",
|
||
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145008",
|
||
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145009",
|
||
"Comment": "kernel-modules-drm-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145010",
|
||
"Comment": "kernel-modules-ide-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145011",
|
||
"Comment": "kernel-modules-staging-un-def is earlier than 1:5.5.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201145012",
|
||
"Comment": "kernel-modules-v4l-un-def is earlier than 1:5.5.1-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |