2024-06-28 13:17:52 +00:00

1865 lines
95 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221290",
"Version": "oval:org.altlinux.errata:def:20221290",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1290: package `chromium-gost` update to version 97.0.4692.99-alt0.p10.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1290",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1290",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-06051",
"RefURL": "https://bdu.fstec.ru/vul/2021-06051",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06100",
"RefURL": "https://bdu.fstec.ru/vul/2021-06100",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06101",
"RefURL": "https://bdu.fstec.ru/vul/2021-06101",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06102",
"RefURL": "https://bdu.fstec.ru/vul/2021-06102",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06117",
"RefURL": "https://bdu.fstec.ru/vul/2021-06117",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06118",
"RefURL": "https://bdu.fstec.ru/vul/2021-06118",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06119",
"RefURL": "https://bdu.fstec.ru/vul/2021-06119",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06120",
"RefURL": "https://bdu.fstec.ru/vul/2021-06120",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06132",
"RefURL": "https://bdu.fstec.ru/vul/2021-06132",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06136",
"RefURL": "https://bdu.fstec.ru/vul/2021-06136",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06137",
"RefURL": "https://bdu.fstec.ru/vul/2021-06137",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06151",
"RefURL": "https://bdu.fstec.ru/vul/2021-06151",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06157",
"RefURL": "https://bdu.fstec.ru/vul/2021-06157",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06163",
"RefURL": "https://bdu.fstec.ru/vul/2021-06163",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06243",
"RefURL": "https://bdu.fstec.ru/vul/2021-06243",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06244",
"RefURL": "https://bdu.fstec.ru/vul/2021-06244",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06260",
"RefURL": "https://bdu.fstec.ru/vul/2021-06260",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06261",
"RefURL": "https://bdu.fstec.ru/vul/2021-06261",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06276",
"RefURL": "https://bdu.fstec.ru/vul/2021-06276",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06277",
"RefURL": "https://bdu.fstec.ru/vul/2021-06277",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00081",
"RefURL": "https://bdu.fstec.ru/vul/2022-00081",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00082",
"RefURL": "https://bdu.fstec.ru/vul/2022-00082",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00091",
"RefURL": "https://bdu.fstec.ru/vul/2022-00091",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00744",
"RefURL": "https://bdu.fstec.ru/vul/2022-00744",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00745",
"RefURL": "https://bdu.fstec.ru/vul/2022-00745",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00750",
"RefURL": "https://bdu.fstec.ru/vul/2022-00750",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00792",
"RefURL": "https://bdu.fstec.ru/vul/2022-00792",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00834",
"RefURL": "https://bdu.fstec.ru/vul/2022-00834",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00857",
"RefURL": "https://bdu.fstec.ru/vul/2022-00857",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00864",
"RefURL": "https://bdu.fstec.ru/vul/2022-00864",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00865",
"RefURL": "https://bdu.fstec.ru/vul/2022-00865",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00866",
"RefURL": "https://bdu.fstec.ru/vul/2022-00866",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00867",
"RefURL": "https://bdu.fstec.ru/vul/2022-00867",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00868",
"RefURL": "https://bdu.fstec.ru/vul/2022-00868",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00874",
"RefURL": "https://bdu.fstec.ru/vul/2022-00874",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01029",
"RefURL": "https://bdu.fstec.ru/vul/2022-01029",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01053",
"RefURL": "https://bdu.fstec.ru/vul/2022-01053",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01185",
"RefURL": "https://bdu.fstec.ru/vul/2022-01185",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01186",
"RefURL": "https://bdu.fstec.ru/vul/2022-01186",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01187",
"RefURL": "https://bdu.fstec.ru/vul/2022-01187",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01198",
"RefURL": "https://bdu.fstec.ru/vul/2022-01198",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01233",
"RefURL": "https://bdu.fstec.ru/vul/2022-01233",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01235",
"RefURL": "https://bdu.fstec.ru/vul/2022-01235",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01287",
"RefURL": "https://bdu.fstec.ru/vul/2022-01287",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01294",
"RefURL": "https://bdu.fstec.ru/vul/2022-01294",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01300",
"RefURL": "https://bdu.fstec.ru/vul/2022-01300",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01308",
"RefURL": "https://bdu.fstec.ru/vul/2022-01308",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01310",
"RefURL": "https://bdu.fstec.ru/vul/2022-01310",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01311",
"RefURL": "https://bdu.fstec.ru/vul/2022-01311",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01333",
"RefURL": "https://bdu.fstec.ru/vul/2022-01333",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01359",
"RefURL": "https://bdu.fstec.ru/vul/2022-01359",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01361",
"RefURL": "https://bdu.fstec.ru/vul/2022-01361",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01362",
"RefURL": "https://bdu.fstec.ru/vul/2022-01362",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01380",
"RefURL": "https://bdu.fstec.ru/vul/2022-01380",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01560",
"RefURL": "https://bdu.fstec.ru/vul/2022-01560",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01561",
"RefURL": "https://bdu.fstec.ru/vul/2022-01561",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01563",
"RefURL": "https://bdu.fstec.ru/vul/2022-01563",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01708",
"RefURL": "https://bdu.fstec.ru/vul/2022-01708",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01709",
"RefURL": "https://bdu.fstec.ru/vul/2022-01709",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01710",
"RefURL": "https://bdu.fstec.ru/vul/2022-01710",
"Source": "BDU"
},
{
"RefID": "CVE-2021-4052",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4052",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4053",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4053",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4054",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4054",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4055",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4055",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4056",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4056",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4057",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4057",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4058",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4058",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4059",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4059",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4061",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4061",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4062",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4062",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4063",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4063",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4064",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4064",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4065",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4065",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4066",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4066",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4067",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4067",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4068",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4068",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4078",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4078",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4079",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4079",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4098",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4098",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4099",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4099",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4100",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4100",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4101",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4101",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4102",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4102",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0096",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0096",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0097",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0097",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0098",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0098",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0099",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0099",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0100",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0100",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0101",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0101",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0102",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0102",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0103",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0103",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0104",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0104",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0105",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0105",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0106",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0106",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0107",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0107",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0108",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0109",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0109",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0110",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0110",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0111",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0111",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0112",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0112",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0113",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0113",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0114",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0114",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0115",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0115",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0116",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0116",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0117",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0117",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0118",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0118",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0120",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0120",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0289",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0289",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0290",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0290",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0291",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0291",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0292",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0292",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0293",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0293",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0294",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0294",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0295",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0295",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0296",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0296",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0297",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0297",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0298",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0298",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0300",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0300",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0301",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0301",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0302",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0302",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0304",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0304",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0305",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0305",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0306",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0306",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0307",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0307",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0308",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0308",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0309",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0309",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0310",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0310",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0311",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0311",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium-gost to version 97.0.4692.99-alt0.p10.1. \nSecurity Fix(es):\n\n * BDU:2021-06051: Уязвимость компонента BFCache браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06100: Уязвимость расширений браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06101: Уязвимость компонента UI браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06102: Уязвимость веб-приложений браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06117: Уязвимость реализации компонента «New Tab Page» («Новая вкладка») браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать влияние на доступность данных или вызвать отказ в обслуживании\n\n * BDU:2021-06118: Уязвимость реализации функции автозаполнения Autofill браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06119: Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06120: Уязвимость загрузчика браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-06132: Уязвимость обработчика JavaScript-сценариев V8 браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06136: Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06137: Уязвимость компонента автодополнения Autofill браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2021-06151: Уязвимость расширения Window Manager браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06157: Уязвимость набора инструментов для веб-разработки DevTools браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06163: Уязвимость функции захват экрана (Screen Capture) браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06243: Уязвимость библиотеки SwiftShader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06244: Уязвимость библиотеки SwiftShader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06260: Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06261: Уязвимость компонента loader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06276: Уязвимость библиотеки передачи сообщений Mojo браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06277: Уязвимость обработчика JavaScript-сценариев V8 браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2022-00081: Уязвимость интерфейса API браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-00082: Уязвимость расширения WebRTC браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-00091: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-00744: Уязвимость функции конфиденциальности Fenced Frames браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00745: Уязвимость реализации push-уведомлений браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00750: Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00792: Уязвимость диспетчера задачTask Manager браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00834: Уязвимость функции изоляции сайтов (Site Isolation) браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00857: Уязвимость компонента Data Transfer браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-00864: Уязвимость компонента Web packaging браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00865: Уязвимость службы Optimization Guide браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2022-00866: Уязвимость реализации функции автозаполнения Autofill браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-00867: Уязвимость службы Safe Browsing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00868: Уязвимость компонента Storage браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-00874: Уязвимость адресной строки Omnibox браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01029: Уязвимость компонента входа в систему Sign-In браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01053: Уязвимость компонента Task Manager браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-01185: Уязвимость компонента SwiftShader браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01186: Уязвимость реализации функции автозаполнения Autofill браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01187: Уязвимость реализации функции автозаполнения Autofill браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2022-01198: Уязвимость компонента File Manager API браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01233: Уязвимость элемента управления «Bookmarks» («Закладки») браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01235: Уязвимость реализации функции автозаполнения Autofill браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01287: Уязвимость интерфейса File API браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2022-01294: Уязвимость интерфейса Web Serial API браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01300: Уязвимость обработчика JavaScript-сценариев V8 браузера Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01308: Уязвимость интерфейса для поддержки потоковых аудио и видео данных Media streams API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2022-01310: Уязвимость компонента Compositing браузеров браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-01311: Уязвимость реализации компонента WebShare браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01333: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01359: Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки\n\n * BDU:2022-01361: Уязвимость функции захват экрана (Screen Capture) браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01362: Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющая нарушителю выйти из изолированной программной среды\n\n * BDU:2022-01380: Уязвимость компонента Storage браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01560: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01561: Уязвимость менеджера паролей браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01563: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-01708: Уязвимость обработчика PDF-содержимого браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-01709: Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2022-01710: Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2021-4052: Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2021-4053: Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4054: Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2021-4055: Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2021-4056: Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4057: Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4058: Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4059: Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-4061: Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4062: Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4063: Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4064: Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4065: Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4066: Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4067: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4068: Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2021-4078: Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4079: Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.\n\n * CVE-2021-4098: Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2021-4099: Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4100: Object lifecycle issue in ANGLE in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4101: Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2021-4102: Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0096: Use after free in Storage in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0097: Inappropriate implementation in DevTools in Google Chrome prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to to potentially allow extension to escape the sandbox via a crafted HTML page.\n\n * CVE-2022-0098: Use after free in Screen Capture in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gestures.\n\n * CVE-2022-0099: Use after free in Sign-in in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gesture.\n\n * CVE-2022-0100: Heap buffer overflow in Media streams API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0101: Heap buffer overflow in Bookmarks in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via specific user gesture.\n\n * CVE-2022-0102: Type confusion in V8 in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0103: Use after free in SwiftShader in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0104: Heap buffer overflow in ANGLE in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0105: Use after free in PDF Accessibility in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0106: Use after free in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0107: Use after free in File Manager API in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0108: Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-0109: Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.\n\n * CVE-2022-0110: Incorrect security UI in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-0111: Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to incorrectly set origin via a crafted HTML page.\n\n * CVE-2022-0112: Incorrect security UI in Browser UI in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to display missing URL or incorrect URL via a crafted URL.\n\n * CVE-2022-0113: Inappropriate implementation in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-0114: Out of bounds memory access in Blink Serial API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page and virtual serial port driver.\n\n * CVE-2022-0115: Uninitialized use in File API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.\n\n * CVE-2022-0116: Inappropriate implementation in Compositing in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-0117: Policy bypass in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2022-0118: Inappropriate implementation in WebShare in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2022-0120: Inappropriate implementation in Passwords in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially leak cross-origin data via a malicious website.\n\n * CVE-2022-0289: Use after free in Safe browsing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0290: Use after free in Site isolation in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2022-0291: Inappropriate implementation in Storage in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.\n\n * CVE-2022-0292: Inappropriate implementation in Fenced Frames in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2022-0293: Use after free in Web packaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0294: Inappropriate implementation in Push messaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.\n\n * CVE-2022-0295: Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0296: Use after free in Printing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0297: Use after free in Vulkan in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0298: Use after free in Scheduling in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0300: Use after free in Text Input Method Editor in Google Chrome on Android prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0301: Heap buffer overflow in DevTools in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0302: Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0304: Use after free in Bookmarks in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0305: Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.\n\n * CVE-2022-0306: Heap buffer overflow in PDFium in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0307: Use after free in Optimization Guide in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0308: Use after free in Data Transfer in Google Chrome on Chrome OS prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2022-0309: Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2022-0310: Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.\n\n * CVE-2022-0311: Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-02-14"
},
"Updated": {
"Date": "2022-02-14"
},
"BDUs": [
{
"ID": "BDU:2021-06051",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2021-06051",
"Impact": "High",
"Public": "20211122"
},
{
"ID": "BDU:2021-06100",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2021-06100",
"Impact": "High",
"Public": "20211012"
},
{
"ID": "BDU:2021-06101",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06101",
"Impact": "High",
"Public": "20211012"
},
{
"ID": "BDU:2021-06102",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06102",
"Impact": "High",
"Public": "20211012"
},
{
"ID": "BDU:2021-06117",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-06117",
"Impact": "Low",
"Public": "20211031"
},
{
"ID": "BDU:2021-06118",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06118",
"Impact": "High",
"Public": "20211125"
},
{
"ID": "BDU:2021-06119",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190, CWE-191",
"Href": "https://bdu.fstec.ru/vul/2021-06119",
"Impact": "High",
"Public": "20211129"
},
{
"ID": "BDU:2021-06120",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-06120",
"Impact": "High",
"Public": "20211117"
},
{
"ID": "BDU:2021-06132",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-06132",
"Impact": "High",
"Public": "20211118"
},
{
"ID": "BDU:2021-06136",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-664",
"Href": "https://bdu.fstec.ru/vul/2021-06136",
"Impact": "Low",
"Public": "20211119"
},
{
"ID": "BDU:2021-06137",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-451",
"Href": "https://bdu.fstec.ru/vul/2021-06137",
"Impact": "High",
"Public": "20211012"
},
{
"ID": "BDU:2021-06151",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06151",
"Impact": "High",
"Public": "20211129"
},
{
"ID": "BDU:2021-06157",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06157",
"Impact": "High",
"Public": "20211123"
},
{
"ID": "BDU:2021-06163",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06163",
"Impact": "High",
"Public": "20211123"
},
{
"ID": "BDU:2021-06243",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06243",
"Impact": "High",
"Public": "20211116"
},
{
"ID": "BDU:2021-06244",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2021-06244",
"Impact": "High",
"Public": "20211021"
},
{
"ID": "BDU:2021-06260",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2021-06260",
"Impact": "High",
"Public": "20211106"
},
{
"ID": "BDU:2021-06261",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2021-06261",
"Impact": "High",
"Public": "20211018"
},
{
"ID": "BDU:2021-06276",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-06276",
"Impact": "High",
"Public": "20211026"
},
{
"ID": "BDU:2021-06277",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-06277",
"Impact": "High",
"Public": "20211209"
},
{
"ID": "BDU:2022-00081",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00081",
"Impact": "Low",
"Public": "20211206"
},
{
"ID": "BDU:2022-00082",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00082",
"Impact": "Low",
"Public": "20211206"
},
{
"ID": "BDU:2022-00091",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-00091",
"Impact": "Low",
"Public": "20211206"
},
{
"ID": "BDU:2022-00744",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00744",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "BDU:2022-00745",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00745",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "BDU:2022-00750",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00750",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "BDU:2022-00792",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00792",
"Impact": "High",
"Public": "20220124"
},
{
"ID": "BDU:2022-00834",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00834",
"Impact": "High",
"Public": "20220119"
},
{
"ID": "BDU:2022-00857",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00857",
"Impact": "Low",
"Public": "20211124"
},
{
"ID": "BDU:2022-00864",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00864",
"Impact": "High",
"Public": "20211230"
},
{
"ID": "BDU:2022-00865",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00865",
"Impact": "Low",
"Public": "20211221"
},
{
"ID": "BDU:2022-00866",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00866",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "BDU:2022-00867",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00867",
"Impact": "Critical",
"Public": "20220105"
},
{
"ID": "BDU:2022-00868",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-00868",
"Impact": "High",
"Public": "20211219"
},
{
"ID": "BDU:2022-00874",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00874",
"Impact": "High",
"Public": "20220119"
},
{
"ID": "BDU:2022-01029",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01029",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "BDU:2022-01053",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01053",
"Impact": "High",
"Public": "20220124"
},
{
"ID": "BDU:2022-01185",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-461",
"Href": "https://bdu.fstec.ru/vul/2022-01185",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01186",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-451",
"Href": "https://bdu.fstec.ru/vul/2022-01186",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01187",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-01187",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01198",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01198",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01233",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-01233",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01235",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01235",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01287",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-908",
"Href": "https://bdu.fstec.ru/vul/2022-01287",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01294",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-01294",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01300",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2022-01300",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01308",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-01308",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01310",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01310",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01311",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01311",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01333",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-01333",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01359",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2022-01359",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01361",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01361",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01362",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01362",
"Impact": "Critical",
"Public": "20220104"
},
{
"ID": "BDU:2022-01380",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01380",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01560",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2022-01560",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01561",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-346",
"Href": "https://bdu.fstec.ru/vul/2022-01561",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01563",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-451",
"Href": "https://bdu.fstec.ru/vul/2022-01563",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01708",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01708",
"Impact": "High",
"Public": "20220104"
},
{
"ID": "BDU:2022-01709",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2022-01709",
"Impact": "Low",
"Public": "20220104"
},
{
"ID": "BDU:2022-01710",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01710",
"Impact": "High",
"Public": "20220104"
}
],
"CVEs": [
{
"ID": "CVE-2021-4052",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4052",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4053",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4053",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4054",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4054",
"Impact": "Low",
"Public": "20211223"
},
{
"ID": "CVE-2021-4055",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4055",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4056",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4056",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4057",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4057",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4058",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4058",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4059",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4059",
"Impact": "Low",
"Public": "20211223"
},
{
"ID": "CVE-2021-4061",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4061",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4062",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4062",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4063",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4063",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4064",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4064",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4065",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4065",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4066",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-191",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4066",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4067",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4067",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4068",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-116",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4068",
"Impact": "Low",
"Public": "20211223"
},
{
"ID": "CVE-2021-4078",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4078",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4079",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4079",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "CVE-2021-4098",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4098",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "CVE-2021-4099",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4099",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "CVE-2021-4100",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4100",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "CVE-2021-4101",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4101",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "CVE-2021-4102",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4102",
"Impact": "High",
"Public": "20220211"
},
{
"ID": "CVE-2022-0096",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0096",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0097",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0097",
"Impact": "Critical",
"Public": "20220212"
},
{
"ID": "CVE-2022-0098",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0098",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0099",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0099",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0100",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0100",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0101",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0101",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0102",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0102",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0103",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0103",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0104",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0104",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0105",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0105",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0106",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0106",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0107",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0107",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0108",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0109",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0109",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0110",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-1021",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0110",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0111",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0111",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0112",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0112",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0113",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0113",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0114",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0114",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0115",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0115",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0116",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0116",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0117",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0117",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0118",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0118",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0120",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0120",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0289",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0289",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0290",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0290",
"Impact": "Critical",
"Public": "20220212"
},
{
"ID": "CVE-2022-0291",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0291",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0292",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0292",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0293",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0293",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0294",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0294",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0295",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0295",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0296",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0296",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0297",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0297",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0298",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0298",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0300",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0300",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0301",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0301",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0302",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0302",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0304",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0304",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0305",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0305",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0306",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0306",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0307",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0307",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0308",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0308",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0309",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0309",
"Impact": "Low",
"Public": "20220212"
},
{
"ID": "CVE-2022-0310",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0310",
"Impact": "High",
"Public": "20220212"
},
{
"ID": "CVE-2022-0311",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0311",
"Impact": "High",
"Public": "20220212"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221290001",
"Comment": "chromium-gost is earlier than 0:97.0.4692.99-alt0.p10.1"
}
]
}
]
}
}
]
}