2024-06-28 13:17:52 +00:00

2235 lines
126 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191433",
"Version": "oval:org.altlinux.errata:def:20191433",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1433: package `kernel-image-std-def` update to version 4.19.27-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1433",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1433",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00713",
"RefURL": "https://bdu.fstec.ru/vul/2018-00713",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00714",
"RefURL": "https://bdu.fstec.ru/vul/2018-00714",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00715",
"RefURL": "https://bdu.fstec.ru/vul/2018-00715",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00716",
"RefURL": "https://bdu.fstec.ru/vul/2018-00716",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00979",
"RefURL": "https://bdu.fstec.ru/vul/2018-00979",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01436",
"RefURL": "https://bdu.fstec.ru/vul/2018-01436",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00067",
"RefURL": "https://bdu.fstec.ru/vul/2019-00067",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00517",
"RefURL": "https://bdu.fstec.ru/vul/2019-00517",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00570",
"RefURL": "https://bdu.fstec.ru/vul/2019-00570",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00978",
"RefURL": "https://bdu.fstec.ru/vul/2019-00978",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01052",
"RefURL": "https://bdu.fstec.ru/vul/2019-01052",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01056",
"RefURL": "https://bdu.fstec.ru/vul/2019-01056",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01057",
"RefURL": "https://bdu.fstec.ru/vul/2019-01057",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01058",
"RefURL": "https://bdu.fstec.ru/vul/2019-01058",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01062",
"RefURL": "https://bdu.fstec.ru/vul/2019-01062",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01343",
"RefURL": "https://bdu.fstec.ru/vul/2019-01343",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01345",
"RefURL": "https://bdu.fstec.ru/vul/2019-01345",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01409",
"RefURL": "https://bdu.fstec.ru/vul/2019-01409",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02163",
"RefURL": "https://bdu.fstec.ru/vul/2019-02163",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02380",
"RefURL": "https://bdu.fstec.ru/vul/2019-02380",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02381",
"RefURL": "https://bdu.fstec.ru/vul/2019-02381",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02508",
"RefURL": "https://bdu.fstec.ru/vul/2019-02508",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02512",
"RefURL": "https://bdu.fstec.ru/vul/2019-02512",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02783",
"RefURL": "https://bdu.fstec.ru/vul/2019-02783",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03067",
"RefURL": "https://bdu.fstec.ru/vul/2019-03067",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03298",
"RefURL": "https://bdu.fstec.ru/vul/2019-03298",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03459",
"RefURL": "https://bdu.fstec.ru/vul/2019-03459",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03624",
"RefURL": "https://bdu.fstec.ru/vul/2019-03624",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04744",
"RefURL": "https://bdu.fstec.ru/vul/2019-04744",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00620",
"RefURL": "https://bdu.fstec.ru/vul/2020-00620",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00735",
"RefURL": "https://bdu.fstec.ru/vul/2020-00735",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00842",
"RefURL": "https://bdu.fstec.ru/vul/2020-00842",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02916",
"RefURL": "https://bdu.fstec.ru/vul/2020-02916",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02917",
"RefURL": "https://bdu.fstec.ru/vul/2020-02917",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03257",
"RefURL": "https://bdu.fstec.ru/vul/2020-03257",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03258",
"RefURL": "https://bdu.fstec.ru/vul/2020-03258",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03259",
"RefURL": "https://bdu.fstec.ru/vul/2020-03259",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03260",
"RefURL": "https://bdu.fstec.ru/vul/2020-03260",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03261",
"RefURL": "https://bdu.fstec.ru/vul/2020-03261",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03262",
"RefURL": "https://bdu.fstec.ru/vul/2020-03262",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03263",
"RefURL": "https://bdu.fstec.ru/vul/2020-03263",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03265",
"RefURL": "https://bdu.fstec.ru/vul/2020-03265",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03305",
"RefURL": "https://bdu.fstec.ru/vul/2020-03305",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01415",
"RefURL": "https://bdu.fstec.ru/vul/2021-01415",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01416",
"RefURL": "https://bdu.fstec.ru/vul/2021-01416",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01417",
"RefURL": "https://bdu.fstec.ru/vul/2021-01417",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01418",
"RefURL": "https://bdu.fstec.ru/vul/2021-01418",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01420",
"RefURL": "https://bdu.fstec.ru/vul/2021-01420",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01436",
"RefURL": "https://bdu.fstec.ru/vul/2021-01436",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01437",
"RefURL": "https://bdu.fstec.ru/vul/2021-01437",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01438",
"RefURL": "https://bdu.fstec.ru/vul/2021-01438",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01834",
"RefURL": "https://bdu.fstec.ru/vul/2021-01834",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04134",
"RefURL": "https://bdu.fstec.ru/vul/2021-04134",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00150",
"RefURL": "https://bdu.fstec.ru/vul/2022-00150",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03968",
"RefURL": "https://bdu.fstec.ru/vul/2022-03968",
"Source": "BDU"
},
{
"RefID": "CVE-2016-10723",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10723",
"Source": "CVE"
},
{
"RefID": "CVE-2017-1000407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000407",
"Source": "CVE"
},
{
"RefID": "CVE-2017-1000410",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410",
"Source": "CVE"
},
{
"RefID": "CVE-2017-18216",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18216",
"Source": "CVE"
},
{
"RefID": "CVE-2017-18224",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18224",
"Source": "CVE"
},
{
"RefID": "CVE-2017-18232",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18232",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1000204",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000204",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10021",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10021",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10074",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10074",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10322",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10322",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10323",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10323",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1065",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1065",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10853",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10853",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10878",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10878",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10879",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10880",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10881",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1092",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1092",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1093",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1093",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1094",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1094",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10940",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10940",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1095",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1095",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1108",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1108",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1118",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1120",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1130",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1130",
"Source": "CVE"
},
{
"RefID": "CVE-2018-11412",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-11412",
"Source": "CVE"
},
{
"RefID": "CVE-2018-11508",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-11508",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12232",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12233",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12233",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12633",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12633",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12896",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12896",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12904",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12904",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13053",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13053",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13093",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13093",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13094",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13094",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13095",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13095",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13097",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13097",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13098",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13098",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13100",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13100",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14609",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14610",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14610",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14611",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14611",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14612",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14612",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14613",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14613",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14614",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14614",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14615",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14615",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14616",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14616",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14617",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14617",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14656",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14734",
"Source": "CVE"
},
{
"RefID": "CVE-2018-15471",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15471",
"Source": "CVE"
},
{
"RefID": "CVE-2018-15572",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15572",
"Source": "CVE"
},
{
"RefID": "CVE-2018-15594",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15594",
"Source": "CVE"
},
{
"RefID": "CVE-2018-16658",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16658",
"Source": "CVE"
},
{
"RefID": "CVE-2018-17972",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17972",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18021",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18021",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18281",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18281",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18397",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18397",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18690",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18690",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18710",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18710",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19406",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19406",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19407",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19824",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19824",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19854",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19985",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19985",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20169",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20169",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20511",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20511",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20855",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20855",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20856",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20856",
"Source": "CVE"
},
{
"RefID": "CVE-2018-20976",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20976",
"Source": "CVE"
},
{
"RefID": "CVE-2018-21008",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-21008",
"Source": "CVE"
},
{
"RefID": "CVE-2018-25020",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25020",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5390",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5391",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6412",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6412",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6554",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6554",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6555",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6555",
"Source": "CVE"
},
{
"RefID": "CVE-2018-7273",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7273",
"Source": "CVE"
},
{
"RefID": "CVE-2018-7740",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7740",
"Source": "CVE"
},
{
"RefID": "CVE-2018-7754",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7754",
"Source": "CVE"
},
{
"RefID": "CVE-2018-7755",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7755",
"Source": "CVE"
},
{
"RefID": "CVE-2018-7757",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757",
"Source": "CVE"
},
{
"RefID": "CVE-2018-7995",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7995",
"Source": "CVE"
},
{
"RefID": "CVE-2018-8043",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-8043",
"Source": "CVE"
},
{
"RefID": "CVE-2018-8087",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-8087",
"Source": "CVE"
},
{
"RefID": "CVE-2018-8822",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-8822",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10207",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14763",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14763",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16921",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16921",
"Source": "CVE"
},
{
"RefID": "CVE-2019-3701",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3701",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5489",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7308",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7308",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9213",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10774",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
"Source": "CVE"
},
{
"RefID": "CVE-2021-20219",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20219",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-std-def to version 4.19.27-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00713: Уязвимость функции ext4_xattr_check_entries ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00714: Уязвимость функции ext4_fill_super ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00715: Уязвимость функции ext4_valid_block_bitmap ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00716: Уязвимость функции ext4_iget ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00979: Уязвимость функций tcp_collapse_ofo_queue и tcp_prune_ofo_queue операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-01436: Уязвимость ядра операционной системы Linux, связанная с ошибками обработки фрагментированных IP-пакетов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00067: Уязвимость функции mincore () ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-00517: Уязвимость функции alarm_timer_nsleep (kernel/time/alarmtimer.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00570: Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-00978: Уязвимость в файле drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01052: Уязвимость функции vcpu_scan_ioapic ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01056: Уязвимость функции ext4_init_block_bitmap() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01057: Уязвимость функции ext4_xattr_set_entry() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01058: Уязвимость функции ext4_update_inline_data() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01062: Уязвимость функции crypto_report_one() ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-01343: Уязвимость функции cdrom_ioctl_drive_status() операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-01345: Уязвимость функции xfs_attr_shortform_addname реализации файловой системы XFS операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01409: Уязвимость функции hso_get_config_data ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02163: Уязвимость функции show_opcodes ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-02380: Уязвимость функции __usb_get_extra_descriptor подсистемы USB ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2019-02381: Уязвимость ядра операционных систем Linux, связанная со смещением указателя за пределы допустимых значений, позволяющая нарушителю реализовать атаки по побочным каналам\n\n * BDU:2019-02508: Уязвимость функции irda_setsockopt ядра операционной системы Linux, позволяющая нарушителю вызывать отказ в обслуживании\n\n * BDU:2019-02512: Уязвимость функции hfsplus_lookup () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02783: Уязвимость в реализации системного вызова mremap() ядра операционной системы Linux, позволяющая нарушителю получить доступ к физической странице\n\n * BDU:2019-03067: Уязвимость функции ipddp_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03298: Уязвимость функции usb_audio_probe ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-03459: Уязвимость функции fd_locked_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03624: Уязвимость функции __blk_drain_queue() в файле block/blk-core.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2019-04744: Уязвимость драйверов drivers/bluetooth/hci_ath.c, drivers/bluetooth/hci_bcm.c, drivers/bluetooth/hci_intel.c, drivers/bluetooth/hci_ldisc.c, drivers/bluetooth/hci_mrvl.c, drivers/bluetooth/hci_qca.c, drivers/bluetooth/hci_uart.h для UART-подключаемых адаптеров Bluetooth ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00620: Уязвимость компонента userfaultfd ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2020-00735: Уязвимость функции xenvif_set_hash_mapping гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-00842: Уязвимость в функции can_can_gw_rcv in net/can/gw.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02916: Уязвимость компонента fs/xfs/xfs_super.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-02917: Уязвимость функции rsi_mac80211_detach ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03257: Уязвимость функции fscrypt_do_page_crypto() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03258: Уязвимость функции remove_dirty_segment() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03259: Уязвимость функции o_ctl_map_page() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03260: Уязвимость функции btrfs_root_node() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03261: Уязвимость функции try_merge_free_space() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03262: Уязвимость функции write_extent_buffer() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03263: Уязвимость функции secs_per_zone ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03265: Уязвимость функции incorrect user_block_count ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03305: Уязвимость функции mmap()ing ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01415: Уязвимость драйвера drivers/staging/irda/net/af_irda.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01416: Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) в файле arch/arm64/kvm/guest.c ядра операционной системы Linux, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании\n\n * BDU:2021-01417: Уязвимость в файле arch/x86/kernel/paravirt.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01418: Уязвимость функции spectre_v2_select_mitigation ядра операционной системы Linux, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01420: Уязвимость функции vhost_new_msg() ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01436: Уязвимость компонента time/posix-timers.c ядра операционной системы Linux, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01437: Уязвимость функции cdrom_ioctl_select_disc (drivers/cdrom/cdrom.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-01438: Уязвимость функции expand_downwards ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01834: Уязвимость функции n_tty_receive_char_special ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04134: Уязвимость функции show_floppy (drivers/block/floppy.c) ядра операционной системы Linux, позволяющая нарушителю обойти защиту ядра и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-00150: Уязвимость подсистемы BPF ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-03968: Уязвимость компонента fs/xfs/libxfs/xfs_inode_buf.c файловой системы XFS ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2016-10723: An issue was discovered in the Linux kernel through 4.17.2. Since the page allocator does not yield CPU resources to the owner of the oom_lock mutex, a local unprivileged user can trivially lock up the system forever by wasting CPU resources from the page allocator (e.g., via concurrent page fault events) when the global OOM killer is invoked. NOTE: the software maintainer has not accepted certain proposed patches, in part because of a viewpoint that \"the underlying problem is non-trivial to handle.\n\n * CVE-2017-1000407: The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.\n\n * CVE-2017-1000410: The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their uninitialized state. By manipulating the code flows that precede the handling of these configuration messages, an attacker can also gain some control over which data will be held in the uninitialized stack variables. This can allow him to bypass KASLR, and stack canaries protection - as both pointers and stack canaries may be leaked in this manner. Combining this vulnerability (for example) with the previously disclosed RCE vulnerability in L2CAP configuration parsing (CVE-2017-1000251) may allow an attacker to exploit the RCE against kernels which were built with the above mitigations. These are the specifics of this vulnerability: In the function l2cap_parse_conf_rsp and in the function l2cap_parse_conf_req the following variable is declared without initialization: struct l2cap_conf_efs efs; In addition, when parsing input configuration parameters in both of these functions, the switch case for handling EFS elements may skip the memcpy call that will write to the efs variable: ... case L2CAP_CONF_EFS: if (olen == sizeof(efs)) memcpy(\u0026efs, (void *)val, olen); ... The olen in the above if is attacker controlled, and regardless of that if, in both of these functions the efs variable would eventually be added to the outgoing configuration request that is being built: l2cap_add_conf_opt(\u0026ptr, L2CAP_CONF_EFS, sizeof(efs), (unsigned long) \u0026efs); So by sending a configuration request, or response, that contains an L2CAP_CONF_EFS element, but with an element length that is not sizeof(efs) - the memcpy to the uninitialized efs variable can be avoided, and the uninitialized variable would be returned to the attacker (16 bytes).\n\n * CVE-2017-18216: In fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used.\n\n * CVE-2017-18224: In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.\n\n * CVE-2017-18232: The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code.\n\n * CVE-2018-1000204: Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\n\n * CVE-2018-10021: drivers/scsi/libsas/sas_scsi_host.c in the Linux kernel before 4.16 allows local users to cause a denial of service (ata qc leak) by triggering certain failure conditions. NOTE: a third party disputes the relevance of this report because the failure can only occur for physically proximate attackers who unplug SAS Host Bus Adapter cables\n\n * CVE-2018-10074: The hi3660_stub_clk_probe function in drivers/clk/hisilicon/clk-hi3660-stub.c in the Linux kernel before 4.16 allows local users to cause a denial of service (NULL pointer dereference) by triggering a failure of resource retrieval.\n\n * CVE-2018-10322: The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.\n\n * CVE-2018-10323: The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.\n\n * CVE-2018-1065: The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.\n\n * CVE-2018-10853: A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.\n\n * CVE-2018-10878: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.\n\n * CVE-2018-10879: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.\n\n * CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.\n\n * CVE-2018-10881: A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.\n\n * CVE-2018-1092: The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.\n\n * CVE-2018-1093: The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.\n\n * CVE-2018-10940: The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.\n\n * CVE-2018-1094: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.\n\n * CVE-2018-1095: The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.\n\n * CVE-2018-1108: kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.\n\n * CVE-2018-1118: Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.\n\n * CVE-2018-1120: A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).\n\n * CVE-2018-1130: Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.\n\n * CVE-2018-11412: In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode.\n\n * CVE-2018-11508: The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.\n\n * CVE-2018-12232: In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.\n\n * CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.\n\n * CVE-2018-12633: An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (hdr.size_in and hdr.size_out) in the header between the two fetches because of a race condition, leading to severe kernel errors, such as buffer over-accesses. This bug can cause a local denial of service and information leakage.\n\n * CVE-2018-12896: An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.\n\n * CVE-2018-12904: In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.\n\n * CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.\n\n * CVE-2018-13093: An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-\u003ei_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.\n\n * CVE-2018-13094: An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.\n\n * CVE-2018-13095: An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.\n\n * CVE-2018-13097: An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.17.3. There is an out-of-bounds read or a divide-by-zero error for an incorrect user_block_count in a corrupted f2fs image, leading to a denial of service (BUG).\n\n * CVE-2018-13098: An issue was discovered in fs/f2fs/inode.c in the Linux kernel through 4.17.3. A denial of service (slab out-of-bounds read and BUG) can occur for a modified f2fs filesystem image in which FI_EXTRA_ATTR is set in an inode.\n\n * CVE-2018-13100: An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.17.3, which does not properly validate secs_per_zone in a corrupted f2fs image, as demonstrated by a divide-by-zero error.\n\n * CVE-2018-14609: An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.\n\n * CVE-2018-14610: An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.\n\n * CVE-2018-14611: An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c.\n\n * CVE-2018-14612: An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in btrfs_root_node() when mounting a crafted btrfs image, because of a lack of chunk block group mapping validation in btrfs_read_block_groups in fs/btrfs/extent-tree.c, and a lack of empty-tree checks in check_leaf in fs/btrfs/tree-checker.c.\n\n * CVE-2018-14613: An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.\n\n * CVE-2018-14614: An issue was discovered in the Linux kernel through 4.17.10. There is an out-of-bounds access in __remove_dirty_segment() in fs/f2fs/segment.c when mounting an f2fs image.\n\n * CVE-2018-14615: An issue was discovered in the Linux kernel through 4.17.10. There is a buffer overflow in truncate_inline_inode() in fs/f2fs/inline.c when umounting an f2fs image, because a length value may be negative.\n\n * CVE-2018-14616: An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference in fscrypt_do_page_crypto() in fs/crypto/crypto.c when operating on a file in a corrupted f2fs image.\n\n * CVE-2018-14617: An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.\n\n * CVE-2018-14656: A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.\n\n * CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).\n\n * CVE-2018-15471: An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.\n\n * CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.\n\n * CVE-2018-15594: arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.\n\n * CVE-2018-16658: An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.\n\n * CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.\n\n * CVE-2018-18021: arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes.\n\n * CVE-2018-18281: Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.\n\n * CVE-2018-18397: The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.\n\n * CVE-2018-18690: In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.\n\n * CVE-2018-18710: An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.\n\n * CVE-2018-19406: kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.\n\n * CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.\n\n * CVE-2018-19824: In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.\n\n * CVE-2018-19854: An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).\n\n * CVE-2018-19985: The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.\n\n * CVE-2018-20169: An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.\n\n * CVE-2018-20511: An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.\n\n * CVE-2018-20855: An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.\n\n * CVE-2018-20856: An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.\n\n * CVE-2018-20976: An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.\n\n * CVE-2018-21008: An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.\n\n * CVE-2018-25020: The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.\n\n * CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.\n\n * CVE-2018-5391: The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.\n\n * CVE-2018-6412: In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands.\n\n * CVE-2018-6554: Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.\n\n * CVE-2018-6555: The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.\n\n * CVE-2018-7273: In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.\n\n * CVE-2018-7740: The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.\n\n * CVE-2018-7754: The aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c in the Linux kernel through 4.16.4rc4 allows local users to obtain sensitive address information by reading \"ffree: \" lines in a debugfs file.\n\n * CVE-2018-7755: An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.\n\n * CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.\n\n * CVE-2018-7995: Race condition in the store_int_with_restart() function in arch/x86/kernel/cpu/mcheck/mce.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (panic) by leveraging root access to write to the check_interval file in a /sys/devices/system/machinecheck/machinecheck\u003ccpu number\u003e directory. NOTE: a third party has indicated that this report is not security relevant\n\n * CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).\n\n * CVE-2018-8087: Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.\n\n * CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.\n\n * CVE-2019-10207: A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.\n\n * CVE-2019-14763: In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.\n\n * CVE-2019-16921: In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813.\n\n * CVE-2019-3701: An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.\n\n * CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.\n\n * CVE-2019-7308: kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.\n\n * CVE-2019-9213: In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.\n\n * CVE-2020-10774: A memory disclosure flaw was found in the Linux kernel's versions before 4.18.0-193.el8 in the sysctl subsystem when reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.\n\n * CVE-2021-20219: A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a changing ldata-\u003eread_head, and a missing sanity check) and cause a threat to the system availability.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-03-14"
},
"Updated": {
"Date": "2019-03-14"
},
"BDUs": [
{
"ID": "BDU:2018-00713",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2018-00713",
"Impact": "Low",
"Public": "20180329"
},
{
"ID": "BDU:2018-00714",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2018-00714",
"Impact": "Low",
"Public": "20180329"
},
{
"ID": "BDU:2018-00715",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2018-00715",
"Impact": "Low",
"Public": "20180326"
},
{
"ID": "BDU:2018-00716",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2018-00716",
"Impact": "Low",
"Public": "20180329"
},
{
"ID": "BDU:2018-00979",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2018-00979",
"Impact": "High",
"Public": "20180723"
},
{
"ID": "BDU:2018-01436",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-400",
"Href": "https://bdu.fstec.ru/vul/2018-01436",
"Impact": "High",
"Public": "20180805"
},
{
"ID": "BDU:2019-00067",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-319",
"Href": "https://bdu.fstec.ru/vul/2019-00067",
"Impact": "Low",
"Public": "20190106"
},
{
"ID": "BDU:2019-00517",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2019-00517",
"Impact": "Low",
"Public": "20180701"
},
{
"ID": "BDU:2019-00570",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-284, CWE-362",
"Href": "https://bdu.fstec.ru/vul/2019-00570",
"Impact": "Low",
"Public": "20181002"
},
{
"ID": "BDU:2019-00978",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-00978",
"Impact": "High",
"Public": "20180604"
},
{
"ID": "BDU:2019-01052",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-01052",
"Impact": "Low",
"Public": "20181119"
},
{
"ID": "BDU:2019-01056",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-01056",
"Impact": "High",
"Public": "20180613"
},
{
"ID": "BDU:2019-01057",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01057",
"Impact": "High",
"Public": "20180613"
},
{
"ID": "BDU:2019-01058",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-01058",
"Impact": "Low",
"Public": "20180616"
},
{
"ID": "BDU:2019-01062",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-01062",
"Impact": "Low",
"Public": "20181109"
},
{
"ID": "BDU:2019-01343",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-01343",
"Impact": "Low",
"Public": "20180426"
},
{
"ID": "BDU:2019-01345",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-19, CWE-754",
"Href": "https://bdu.fstec.ru/vul/2019-01345",
"Impact": "Low",
"Public": "20180417"
},
{
"ID": "BDU:2019-01409",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-01409",
"Impact": "Low",
"Public": "20181212"
},
{
"ID": "BDU:2019-02163",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-02163",
"Impact": "Low",
"Public": "20181008"
},
{
"ID": "BDU:2019-02380",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-400, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-02380",
"Impact": "Low",
"Public": "20181205"
},
{
"ID": "BDU:2019-02381",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-189, CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-02381",
"Impact": "Low",
"Public": "20190102"
},
{
"ID": "BDU:2019-02508",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-02508",
"Impact": "High",
"Public": "20180904"
},
{
"ID": "BDU:2019-02512",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-02512",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "BDU:2019-02783",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-459",
"Href": "https://bdu.fstec.ru/vul/2019-02783",
"Impact": "High",
"Public": "20181018"
},
{
"ID": "BDU:2019-03067",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03067",
"Impact": "Low",
"Public": "20180913"
},
{
"ID": "BDU:2019-03298",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03298",
"Impact": "High",
"Public": "20181202"
},
{
"ID": "BDU:2019-03459",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-03459",
"Impact": "Low",
"Public": "20180307"
},
{
"ID": "BDU:2019-03624",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03624",
"Impact": "High",
"Public": "20180730"
},
{
"ID": "BDU:2019-04744",
"CVSS": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-04744",
"Impact": "Low",
"Public": "20190729"
},
{
"ID": "BDU:2020-00620",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20, CWE-863",
"Href": "https://bdu.fstec.ru/vul/2020-00620",
"Impact": "Low",
"Public": "20181130"
},
{
"ID": "BDU:2020-00735",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125, CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-00735",
"Impact": "High",
"Public": "20180816"
},
{
"ID": "BDU:2020-00842",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-00842",
"Impact": "Low",
"Public": "20190107"
},
{
"ID": "BDU:2020-02916",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02916",
"Impact": "High",
"Public": "20180515"
},
{
"ID": "BDU:2020-02917",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02917",
"Impact": "Low",
"Public": "20180523"
},
{
"ID": "BDU:2020-03257",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-03257",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "BDU:2020-03258",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-03258",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "BDU:2020-03259",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-03259",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "BDU:2020-03260",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-03260",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "BDU:2020-03261",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03261",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "BDU:2020-03262",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03262",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "BDU:2020-03263",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://bdu.fstec.ru/vul/2020-03263",
"Impact": "Low",
"Public": "20180702"
},
{
"ID": "BDU:2020-03265",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125, CWE-369",
"Href": "https://bdu.fstec.ru/vul/2020-03265",
"Impact": "Low",
"Public": "20180702"
},
{
"ID": "BDU:2020-03305",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-122",
"Href": "https://bdu.fstec.ru/vul/2020-03305",
"Impact": "Low",
"Public": "20180517"
},
{
"ID": "BDU:2021-01415",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://bdu.fstec.ru/vul/2021-01415",
"Impact": "Low",
"Public": "20180904"
},
{
"ID": "BDU:2021-01416",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01416",
"Impact": "High",
"Public": "20181001"
},
{
"ID": "BDU:2021-01417",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-01417",
"Impact": "Low",
"Public": "20180820"
},
{
"ID": "BDU:2021-01418",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-01418",
"Impact": "Low",
"Public": "20180731"
},
{
"ID": "BDU:2021-01420",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-665",
"Href": "https://bdu.fstec.ru/vul/2021-01420",
"Impact": "Low",
"Public": "20180509"
},
{
"ID": "BDU:2021-01436",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2021-01436",
"Impact": "Low",
"Public": "20180701"
},
{
"ID": "BDU:2021-01437",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-01437",
"Impact": "Low",
"Public": "20181003"
},
{
"ID": "BDU:2021-01438",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-01438",
"Impact": "Low",
"Public": "20190227"
},
{
"ID": "BDU:2021-01834",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404, CWE-606, CWE-697",
"Href": "https://bdu.fstec.ru/vul/2021-01834",
"Impact": "Low",
"Public": "20210201"
},
{
"ID": "BDU:2021-04134",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-04134",
"Impact": "Low",
"Public": "20171129"
},
{
"ID": "BDU:2022-00150",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-00150",
"Impact": "High",
"Public": "20180517"
},
{
"ID": "BDU:2022-03968",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-03968",
"Impact": "Low",
"Public": "20180621"
}
],
"CVEs": [
{
"ID": "CVE-2016-10723",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10723",
"Impact": "Low",
"Public": "20180621"
},
{
"ID": "CVE-2017-1000407",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000407",
"Impact": "High",
"Public": "20171211"
},
{
"ID": "CVE-2017-1000410",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410",
"Impact": "High",
"Public": "20171207"
},
{
"ID": "CVE-2017-18216",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18216",
"Impact": "Low",
"Public": "20180305"
},
{
"ID": "CVE-2017-18224",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18224",
"Impact": "Low",
"Public": "20180312"
},
{
"ID": "CVE-2017-18232",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18232",
"Impact": "Low",
"Public": "20180315"
},
{
"ID": "CVE-2018-1000204",
"CVSS": "AV:N/AC:M/Au:S/C:C/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000204",
"Impact": "Low",
"Public": "20180626"
},
{
"ID": "CVE-2018-10021",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10021",
"Impact": "Low",
"Public": "20180411"
},
{
"ID": "CVE-2018-10074",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10074",
"Impact": "Low",
"Public": "20180412"
},
{
"ID": "CVE-2018-10322",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10322",
"Impact": "Low",
"Public": "20180424"
},
{
"ID": "CVE-2018-10323",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10323",
"Impact": "Low",
"Public": "20180424"
},
{
"ID": "CVE-2018-1065",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1065",
"Impact": "Low",
"Public": "20180302"
},
{
"ID": "CVE-2018-10853",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10853",
"Impact": "High",
"Public": "20180911"
},
{
"ID": "CVE-2018-10878",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10878",
"Impact": "High",
"Public": "20180726"
},
{
"ID": "CVE-2018-10879",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879",
"Impact": "High",
"Public": "20180726"
},
{
"ID": "CVE-2018-10880",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880",
"Impact": "Low",
"Public": "20180725"
},
{
"ID": "CVE-2018-10881",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "CVE-2018-1092",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1092",
"Impact": "Low",
"Public": "20180402"
},
{
"ID": "CVE-2018-1093",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1093",
"Impact": "Low",
"Public": "20180402"
},
{
"ID": "CVE-2018-1094",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1094",
"Impact": "Low",
"Public": "20180402"
},
{
"ID": "CVE-2018-10940",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10940",
"Impact": "Low",
"Public": "20180509"
},
{
"ID": "CVE-2018-1095",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1095",
"Impact": "Low",
"Public": "20180402"
},
{
"ID": "CVE-2018-1108",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1108",
"Impact": "Low",
"Public": "20180521"
},
{
"ID": "CVE-2018-1118",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118",
"Impact": "Low",
"Public": "20180510"
},
{
"ID": "CVE-2018-1120",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120",
"Impact": "Low",
"Public": "20180620"
},
{
"ID": "CVE-2018-1130",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1130",
"Impact": "Low",
"Public": "20180510"
},
{
"ID": "CVE-2018-11412",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-11412",
"Impact": "Low",
"Public": "20180524"
},
{
"ID": "CVE-2018-11508",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-11508",
"Impact": "Low",
"Public": "20180528"
},
{
"ID": "CVE-2018-12232",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232",
"Impact": "Low",
"Public": "20180612"
},
{
"ID": "CVE-2018-12233",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12233",
"Impact": "High",
"Public": "20180612"
},
{
"ID": "CVE-2018-12633",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12633",
"Impact": "Low",
"Public": "20180622"
},
{
"ID": "CVE-2018-12896",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12896",
"Impact": "Low",
"Public": "20180702"
},
{
"ID": "CVE-2018-12904",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12904",
"Impact": "Low",
"Public": "20180627"
},
{
"ID": "CVE-2018-13053",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13053",
"Impact": "Low",
"Public": "20180702"
},
{
"ID": "CVE-2018-13093",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13093",
"Impact": "Low",
"Public": "20180703"
},
{
"ID": "CVE-2018-13094",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13094",
"Impact": "Low",
"Public": "20180703"
},
{
"ID": "CVE-2018-13095",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13095",
"Impact": "Low",
"Public": "20180703"
},
{
"ID": "CVE-2018-13097",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13097",
"Impact": "Low",
"Public": "20180703"
},
{
"ID": "CVE-2018-13098",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13098",
"Impact": "Low",
"Public": "20180703"
},
{
"ID": "CVE-2018-13100",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13100",
"Impact": "Low",
"Public": "20180703"
},
{
"ID": "CVE-2018-14609",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14609",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14610",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14610",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14611",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14611",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14612",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14612",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14613",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14613",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14614",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14614",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14615",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14615",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14616",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14616",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14617",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14617",
"Impact": "Low",
"Public": "20180727"
},
{
"ID": "CVE-2018-14656",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14656",
"Impact": "Low",
"Public": "20181008"
},
{
"ID": "CVE-2018-14734",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14734",
"Impact": "High",
"Public": "20180729"
},
{
"ID": "CVE-2018-15471",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15471",
"Impact": "High",
"Public": "20180817"
},
{
"ID": "CVE-2018-15572",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15572",
"Impact": "Low",
"Public": "20180820"
},
{
"ID": "CVE-2018-15594",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15594",
"Impact": "Low",
"Public": "20180820"
},
{
"ID": "CVE-2018-16658",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16658",
"Impact": "Low",
"Public": "20180907"
},
{
"ID": "CVE-2018-17972",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17972",
"Impact": "Low",
"Public": "20181003"
},
{
"ID": "CVE-2018-18021",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18021",
"Impact": "High",
"Public": "20181007"
},
{
"ID": "CVE-2018-18281",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-459",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18281",
"Impact": "High",
"Public": "20181030"
},
{
"ID": "CVE-2018-18397",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18397",
"Impact": "Low",
"Public": "20181212"
},
{
"ID": "CVE-2018-18690",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18690",
"Impact": "Low",
"Public": "20181026"
},
{
"ID": "CVE-2018-18710",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18710",
"Impact": "Low",
"Public": "20181029"
},
{
"ID": "CVE-2018-19406",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19406",
"Impact": "Low",
"Public": "20181121"
},
{
"ID": "CVE-2018-19407",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19407",
"Impact": "Low",
"Public": "20181121"
},
{
"ID": "CVE-2018-19824",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19824",
"Impact": "High",
"Public": "20181203"
},
{
"ID": "CVE-2018-19854",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19854",
"Impact": "Low",
"Public": "20181204"
},
{
"ID": "CVE-2018-19985",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19985",
"Impact": "Low",
"Public": "20190321"
},
{
"ID": "CVE-2018-20169",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20169",
"Impact": "Low",
"Public": "20181217"
},
{
"ID": "CVE-2018-20511",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20511",
"Impact": "Low",
"Public": "20181227"
},
{
"ID": "CVE-2018-20855",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20855",
"Impact": "Low",
"Public": "20190726"
},
{
"ID": "CVE-2018-20856",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20856",
"Impact": "High",
"Public": "20190726"
},
{
"ID": "CVE-2018-20976",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20976",
"Impact": "High",
"Public": "20190819"
},
{
"ID": "CVE-2018-21008",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-21008",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "CVE-2018-25020",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25020",
"Impact": "High",
"Public": "20211208"
},
{
"ID": "CVE-2018-5390",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390",
"Impact": "High",
"Public": "20180806"
},
{
"ID": "CVE-2018-5391",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391",
"Impact": "High",
"Public": "20180906"
},
{
"ID": "CVE-2018-6412",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6412",
"Impact": "High",
"Public": "20180131"
},
{
"ID": "CVE-2018-6554",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6554",
"Impact": "Low",
"Public": "20180904"
},
{
"ID": "CVE-2018-6555",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6555",
"Impact": "High",
"Public": "20180904"
},
{
"ID": "CVE-2018-7273",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7273",
"Impact": "Low",
"Public": "20180221"
},
{
"ID": "CVE-2018-7740",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7740",
"Impact": "Low",
"Public": "20180307"
},
{
"ID": "CVE-2018-7754",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7754",
"Impact": "Low",
"Public": "20180810"
},
{
"ID": "CVE-2018-7755",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7755",
"Impact": "Low",
"Public": "20180308"
},
{
"ID": "CVE-2018-7757",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757",
"Impact": "Low",
"Public": "20180308"
},
{
"ID": "CVE-2018-7995",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7995",
"Impact": "Low",
"Public": "20180309"
},
{
"ID": "CVE-2018-8043",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-8043",
"Impact": "Low",
"Public": "20180310"
},
{
"ID": "CVE-2018-8087",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-8087",
"Impact": "Low",
"Public": "20180313"
},
{
"ID": "CVE-2018-8822",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-8822",
"Impact": "High",
"Public": "20180320"
},
{
"ID": "CVE-2019-10207",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-14763",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14763",
"Impact": "Low",
"Public": "20190807"
},
{
"ID": "CVE-2019-16921",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-665",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16921",
"Impact": "High",
"Public": "20190927"
},
{
"ID": "CVE-2019-3701",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3701",
"Impact": "Low",
"Public": "20190103"
},
{
"ID": "CVE-2019-5489",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-319",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489",
"Impact": "Low",
"Public": "20190107"
},
{
"ID": "CVE-2019-7308",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7308",
"Impact": "Low",
"Public": "20190201"
},
{
"ID": "CVE-2019-9213",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213",
"Impact": "Low",
"Public": "20190305"
},
{
"ID": "CVE-2020-10774",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-805",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
"Impact": "Low",
"Public": "20210527"
},
{
"ID": "CVE-2021-20219",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-697",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20219",
"Impact": "Low",
"Public": "20210323"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191433001",
"Comment": "kernel-doc-std is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433002",
"Comment": "kernel-headers-modules-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433003",
"Comment": "kernel-headers-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433004",
"Comment": "kernel-image-domU-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433005",
"Comment": "kernel-image-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433006",
"Comment": "kernel-modules-drm-ancient-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433007",
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433008",
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433009",
"Comment": "kernel-modules-drm-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433010",
"Comment": "kernel-modules-ide-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433011",
"Comment": "kernel-modules-kvm-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433012",
"Comment": "kernel-modules-staging-std-def is earlier than 1:4.19.27-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191433013",
"Comment": "kernel-modules-v4l-std-def is earlier than 1:4.19.27-alt1"
}
]
}
]
}
}
]
}