1138 lines
61 KiB
JSON
1138 lines
61 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20161485",
|
|
"Version": "oval:org.altlinux.errata:def:20161485",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-1485: package `kernel-image-std-def` update to version 4.4.9-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-1485",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1485",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-12106",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-12106",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-12123",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-12123",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00513",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00513",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00545",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00545",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00898",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00898",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01134",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01134",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01939",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01939",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02082",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02082",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-03264",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-03264",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-4312",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4312",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7446",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7446",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1339",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1339",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2925",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2925",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4004",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4004",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5257",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5257",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5283",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5283",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5307",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5307",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6937",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6937",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7513",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7513",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7515",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7515",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7550",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7550",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7566",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7566",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7613",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7613",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7799",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7799",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7872",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7872",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7884",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7884",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7885",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7885",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-7990",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7990",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8104",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8104",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8374",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8374",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8539",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8539",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8569",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8569",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8575",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8575",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8660",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8660",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8709",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8709",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8746",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8746",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8767",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8767",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8785",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8785",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8787",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8787",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8812",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8812",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8816",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8816",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8844",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8844",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8845",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8845",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8953",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8953",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8956",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8956",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8962",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8962",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8963",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8963",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8966",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8966",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8970",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8970",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0723",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0723",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0821",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0821",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2053",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2053",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2069",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2069",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2085",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2085",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2384",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2384",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2543",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2543",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2544",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2544",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2545",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2545",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2546",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2546",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2547",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2547",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2548",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2548",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2549",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2549",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2550",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2550",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2847",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2847",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3070",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3070",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3841",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3841",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3955",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3955",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-4565",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4565",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-4805",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4805",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7117",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7117",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-7912",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7912",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-8646",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8646",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-15116",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15116",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-13099",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13099",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades kernel-image-std-def to version 4.4.9-alt1. \nSecurity Fix(es):\n\n * BDU:2015-12106: Уязвимость гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-12123: Уязвимость гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00513: Уязвимость драйвера USB-MIDI ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2016-00545: Уязвимость ядра Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00898: Уязвимость операционной системы Android, позволяющая нарушителю обойти механизм защиты\n\n * BDU:2016-01134: Уязвимость ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2016-01939: Уязвимость стека IPv6 ядра Linux операционной системы Android, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2016-02082: Уязвимость функции usbip_recv_xbuff (drivers/usb/usbip/usbip_common.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2020-03264: Уязвимость компонента fs/f2fs/inline.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2013-4312: The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.\n\n * CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.\n\n * CVE-2015-1339: Memory leak in the cuse_channel_release function in fs/fuse/cuse.c in the Linux kernel before 4.4 allows local users to cause a denial of service (memory consumption) or possibly have unspecified other impact by opening /dev/cuse many times.\n\n * CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a \"double-chroot attack.\"\n\n * CVE-2015-4004: The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.\n\n * CVE-2015-5257: drivers/usb/serial/whiteheat.c in the Linux kernel before 4.2.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted USB device. NOTE: this ID was incorrectly used for an Apache Cordova issue that has the correct ID of CVE-2015-8320.\n\n * CVE-2015-5283: The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.\n\n * CVE-2015-5307: The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.\n\n * CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.\n\n * CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.\n\n * CVE-2015-7515: The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.\n\n * CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.\n\n * CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.\n\n * CVE-2015-7613: Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.\n\n * CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.\n\n * CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.\n\n * CVE-2015-7884: The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.\n\n * CVE-2015-7885: The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.\n\n * CVE-2015-7990: Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.\n\n * CVE-2015-8104: The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.\n\n * CVE-2015-8374: fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.\n\n * CVE-2015-8539: The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.\n\n * CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.\n\n * CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.\n\n * CVE-2015-8660: The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.\n\n * CVE-2015-8709: kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states \"there is no kernel bug here.\n\n * CVE-2015-8746: fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic.\n\n * CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.\n\n * CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.\n\n * CVE-2015-8787: The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604.\n\n * CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.\n\n * CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.\n\n * CVE-2015-8844: The signal implementation in the Linux kernel before 4.3.5 on powerpc platforms does not check for an MSR with both the S and T bits set, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.\n\n * CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.\n\n * CVE-2015-8953: fs/overlayfs/copy_up.c in the Linux kernel before 4.2.6 uses an incorrect cleanup code path, which allows local users to cause a denial of service (dentry reference leak) via filesystem operations on a large file in a lower overlayfs layer.\n\n * CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.\n\n * CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.\n\n * CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.\n\n * CVE-2015-8966: arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 4.4 allows local users to gain privileges via a crafted (1) F_OFD_GETLK, (2) F_OFD_SETLK, or (3) F_OFD_SETLKW command in an fcntl64 system call.\n\n * CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.\n\n * CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.\n\n * CVE-2016-0821: The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.\n\n * CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.\n\n * CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.\n\n * CVE-2016-2085: The evm_verify_hmac function in security/integrity/evm/evm_main.c in the Linux kernel before 4.5 does not properly copy data, which makes it easier for local users to forge MAC values via a timing side-channel attack.\n\n * CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.\n\n * CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.\n\n * CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.\n\n * CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.\n\n * CVE-2016-2546: sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.\n\n * CVE-2016-2547: sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.\n\n * CVE-2016-2548: sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.\n\n * CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.\n\n * CVE-2016-2550: The Linux kernel before 4.5 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by leveraging incorrect tracking of descriptor ownership and sending each descriptor over a UNIX socket before closing it. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-4312.\n\n * CVE-2016-2847: fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.\n\n * CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.\n\n * CVE-2016-3841: The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.\n\n * CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.\n\n * CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.\n\n * CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.\n\n * CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.\n\n * CVE-2016-7912: Use-after-free vulnerability in the ffs_user_copy_worker function in drivers/usb/gadget/function/f_fs.c in the Linux kernel before 4.5.3 allows local users to gain privileges by accessing an I/O data structure after a certain callback call.\n\n * CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.\n\n * CVE-2017-15116: The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference).\n\n * CVE-2018-13099: An issue was discovered in fs/f2fs/inline.c in the Linux kernel through 4.4. A denial of service (out-of-bounds memory access and BUG) can occur for a modified f2fs filesystem image in which an inline inode contains an invalid reserved blkaddr.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-05-12"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-05-12"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-12106",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-12106",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-12123",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-12123",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00513",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00513",
|
|
"Impact": "Low",
|
|
"Public": "20160213"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00545",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00545",
|
|
"Impact": "Critical",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00898",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00898",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01134",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01134",
|
|
"Impact": "Critical",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01939",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264, CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01939",
|
|
"Impact": "High",
|
|
"Public": "20151202"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02082",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02082",
|
|
"Impact": "Critical",
|
|
"Public": "20160330"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-03264",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-03264",
|
|
"Impact": "Low",
|
|
"Public": "20180702"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2013-4312",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4312",
|
|
"Impact": "Low",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7446",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:P/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7446",
|
|
"Impact": "Low",
|
|
"Public": "20151228"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1339",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1339",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2925",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2925",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4004",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4004",
|
|
"Impact": "High",
|
|
"Public": "20150607"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5257",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5257",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5283",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5283",
|
|
"Impact": "Low",
|
|
"Public": "20151019"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5307",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5307",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6937",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6937",
|
|
"Impact": "Low",
|
|
"Public": "20151019"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7513",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-369",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7513",
|
|
"Impact": "Low",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7515",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7515",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7550",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7550",
|
|
"Impact": "Low",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7566",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7566",
|
|
"Impact": "Low",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7613",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7613",
|
|
"Impact": "Low",
|
|
"Public": "20151019"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7799",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7799",
|
|
"Impact": "Low",
|
|
"Public": "20151019"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7872",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7872",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7884",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7884",
|
|
"Impact": "Low",
|
|
"Public": "20151228"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7885",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7885",
|
|
"Impact": "Low",
|
|
"Public": "20151228"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-7990",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7990",
|
|
"Impact": "Low",
|
|
"Public": "20151228"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8104",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8104",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8374",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8374",
|
|
"Impact": "Low",
|
|
"Public": "20151228"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8539",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8539",
|
|
"Impact": "High",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8569",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8569",
|
|
"Impact": "Low",
|
|
"Public": "20151228"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8575",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8575",
|
|
"Impact": "Low",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8660",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8660",
|
|
"Impact": "Low",
|
|
"Public": "20151228"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8709",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8709",
|
|
"Impact": "High",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8746",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8746",
|
|
"Impact": "High",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8767",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8767",
|
|
"Impact": "Low",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8785",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-835",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8785",
|
|
"Impact": "Low",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8787",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8787",
|
|
"Impact": "Critical",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8812",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8812",
|
|
"Impact": "Critical",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8816",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8816",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8844",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8844",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8845",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8845",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8953",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8953",
|
|
"Impact": "Low",
|
|
"Public": "20161016"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8956",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8956",
|
|
"Impact": "Low",
|
|
"Public": "20161010"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8962",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-415",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8962",
|
|
"Impact": "High",
|
|
"Public": "20161116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8963",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8963",
|
|
"Impact": "High",
|
|
"Public": "20161116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8966",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8966",
|
|
"Impact": "High",
|
|
"Public": "20161208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8970",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8970",
|
|
"Impact": "Low",
|
|
"Public": "20161128"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0723",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0723",
|
|
"Impact": "Low",
|
|
"Public": "20160208"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0821",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-908",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0821",
|
|
"Impact": "Low",
|
|
"Public": "20160312"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2053",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-310",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2053",
|
|
"Impact": "Low",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2069",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2069",
|
|
"Impact": "High",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2085",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2085",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2384",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2384",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2543",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2543",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2544",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2544",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2545",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2545",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2546",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2546",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2547",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2547",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2548",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2548",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2549",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2549",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2550",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2550",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2847",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2847",
|
|
"Impact": "Low",
|
|
"Public": "20160427"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3070",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3070",
|
|
"Impact": "High",
|
|
"Public": "20160806"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3841",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3841",
|
|
"Impact": "High",
|
|
"Public": "20160806"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3955",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3955",
|
|
"Impact": "Critical",
|
|
"Public": "20160703"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-4565",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4565",
|
|
"Impact": "High",
|
|
"Public": "20160523"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-4805",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4805",
|
|
"Impact": "High",
|
|
"Public": "20160523"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7117",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7117",
|
|
"Impact": "Critical",
|
|
"Public": "20161010"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-7912",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7912",
|
|
"Impact": "High",
|
|
"Public": "20161116"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-8646",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8646",
|
|
"Impact": "Low",
|
|
"Public": "20161128"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-15116",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15116",
|
|
"Impact": "Low",
|
|
"Public": "20171130"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-13099",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13099",
|
|
"Impact": "Low",
|
|
"Public": "20180703"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485001",
|
|
"Comment": "kernel-doc-std is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485002",
|
|
"Comment": "kernel-headers-modules-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485003",
|
|
"Comment": "kernel-headers-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485004",
|
|
"Comment": "kernel-image-domU-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485005",
|
|
"Comment": "kernel-image-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485006",
|
|
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485007",
|
|
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485008",
|
|
"Comment": "kernel-modules-drm-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485009",
|
|
"Comment": "kernel-modules-ide-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485010",
|
|
"Comment": "kernel-modules-kvm-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485011",
|
|
"Comment": "kernel-modules-staging-std-def is earlier than 1:4.4.9-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161485012",
|
|
"Comment": "kernel-modules-v4l-std-def is earlier than 1:4.4.9-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |