483 lines
24 KiB
JSON
483 lines
24 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20161565",
|
|
"Version": "oval:org.altlinux.errata:def:20161565",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-1565: package `qemu` update to version 2.6.0-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-1565",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1565",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01066",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01066",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01031",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01031",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01032",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01032",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01033",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01033",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8558",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8558",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8567",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8567",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8568",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8568",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8613",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8613",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8619",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8619",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8701",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8701",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8743",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8743",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1568",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1568",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1922",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1922",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1981",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1981",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2197",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2197",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2198",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2198",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2391",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2391",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2392",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2392",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2538",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2538",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2841",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2841",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2857",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2857",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2858",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2858",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3710",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3712",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3712",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-4001",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4001",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-4037",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4037",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6835",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6835",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades qemu to version 2.6.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-01066: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2017-01031: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-01032: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-01033: Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2015-8558: The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.\n\n * CVE-2015-8567: Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).\n\n * CVE-2015-8568: Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.\n\n * CVE-2015-8613: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.\n\n * CVE-2015-8619: The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).\n\n * CVE-2015-8701: QEMU (aka Quick Emulator) built with the Rocker switch emulation support is vulnerable to an off-by-one error. It happens while processing transmit (tx) descriptors in 'tx_consume' routine, if a descriptor was to have more than allowed (ROCKER_TX_FRAGS_MAX=16) fragments. A privileged user inside guest could use this flaw to cause memory leakage on the host or crash the QEMU process instance resulting in DoS issue.\n\n * CVE-2015-8743: QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.\n\n * CVE-2016-1568: Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.\n\n * CVE-2016-1922: QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.\n\n * CVE-2016-1981: QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.\n\n * CVE-2016-2197: QEMU (aka Quick Emulator) built with an IDE AHCI emulation support is vulnerable to a null pointer dereference flaw. It occurs while unmapping the Frame Information Structure (FIS) and Command List Block (CLB) entries. A privileged user inside guest could use this flaw to crash the QEMU process instance resulting in DoS.\n\n * CVE-2016-2198: QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.\n\n * CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.\n\n * CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.\n\n * CVE-2016-2538: Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.\n\n * CVE-2016-2841: The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.\n\n * CVE-2016-2857: The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.\n\n * CVE-2016-2858: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.\n\n * CVE-2016-3710: The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.\n\n * CVE-2016-3712: Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.\n\n * CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.\n\n * CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.\n\n * CVE-2016-6835: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-05-30"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-05-30"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2016-01066",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01066",
|
|
"Impact": "Critical",
|
|
"Public": "20160412"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01031",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01031",
|
|
"Impact": "Low",
|
|
"Public": "20170413"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01032",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01032",
|
|
"Impact": "Low",
|
|
"Public": "20170411"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01033",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01033",
|
|
"Impact": "Low",
|
|
"Public": "20170411"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2015-8558",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-835",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8558",
|
|
"Impact": "Low",
|
|
"Public": "20160523"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8567",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-401",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8567",
|
|
"Impact": "High",
|
|
"Public": "20170413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8568",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-772",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8568",
|
|
"Impact": "Low",
|
|
"Public": "20170411"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8613",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8613",
|
|
"Impact": "Low",
|
|
"Public": "20170411"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8619",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8619",
|
|
"Impact": "High",
|
|
"Public": "20170413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8701",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-193",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8701",
|
|
"Impact": "Low",
|
|
"Public": "20161229"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8743",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8743",
|
|
"Impact": "High",
|
|
"Public": "20161229"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1568",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1568",
|
|
"Impact": "High",
|
|
"Public": "20160412"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1922",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1922",
|
|
"Impact": "Low",
|
|
"Public": "20161229"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1981",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-835",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1981",
|
|
"Impact": "Low",
|
|
"Public": "20161229"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2197",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2197",
|
|
"Impact": "Low",
|
|
"Public": "20161229"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2198",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2198",
|
|
"Impact": "Low",
|
|
"Public": "20161229"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2391",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2391",
|
|
"Impact": "Low",
|
|
"Public": "20160616"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2392",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2392",
|
|
"Impact": "Low",
|
|
"Public": "20160616"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2538",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2538",
|
|
"Impact": "High",
|
|
"Public": "20160616"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2841",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2841",
|
|
"Impact": "Low",
|
|
"Public": "20160616"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2857",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2857",
|
|
"Impact": "High",
|
|
"Public": "20160412"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2858",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-331",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2858",
|
|
"Impact": "Low",
|
|
"Public": "20160407"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3710",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3710",
|
|
"Impact": "High",
|
|
"Public": "20160511"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3712",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3712",
|
|
"Impact": "Low",
|
|
"Public": "20160511"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-4001",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4001",
|
|
"Impact": "High",
|
|
"Public": "20160523"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-4037",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-400",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4037",
|
|
"Impact": "Low",
|
|
"Public": "20160523"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6835",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6835",
|
|
"Impact": "Low",
|
|
"Public": "20161210"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565001",
|
|
"Comment": "ivshmem-tools is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565002",
|
|
"Comment": "qemu is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565003",
|
|
"Comment": "qemu-aux is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565004",
|
|
"Comment": "qemu-common is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565005",
|
|
"Comment": "qemu-doc is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565006",
|
|
"Comment": "qemu-guest-agent is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565007",
|
|
"Comment": "qemu-img is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565008",
|
|
"Comment": "qemu-system is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565009",
|
|
"Comment": "qemu-user is earlier than 0:2.6.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161565010",
|
|
"Comment": "qemu-user-binfmt_misc is earlier than 0:2.6.0-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |