1777 lines
98 KiB
JSON
1777 lines
98 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20171330",
|
||
"Version": "oval:org.altlinux.errata:def:20171330",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2017-1330: package `kernel-image-std-def` update to version 4.9.16-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2017-1330",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1330",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-01985",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-01985",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-01998",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-01998",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-02006",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-02006",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-02241",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-02241",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2016-02351",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2016-02351",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00290",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00290",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00291",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00291",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00292",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00292",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00296",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00296",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00297",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00297",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01557",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01557",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-01558",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-01558",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01631",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01631",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06413",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06413",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03979",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03979",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-9892",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9892",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-9900",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9900",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8839",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8839",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8944",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8944",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2015-8952",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8952",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10147",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10147",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10208",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10208",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10318",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10318",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10741",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10741",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10905",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10905",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10906",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10906",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10907",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10907",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-1237",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1237",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-1575",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1575",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-1576",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1576",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2117",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2117",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2184",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2184",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2185",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2185",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2186",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2186",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2187",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2187",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2188",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2188",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2383",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2383",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2782",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2782",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3134",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3134",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3136",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3136",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3137",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3137",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3138",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3138",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3140",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3140",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3156",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3156",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3672",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3672",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3689",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3689",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-3713",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3713",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4470",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4482",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4482",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4485",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4485",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4486",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4486",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4569",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4569",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4578",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4578",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4580",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4580",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4581",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4581",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-4998",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4998",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5243",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5243",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5244",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5244",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5400",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5400",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5412",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5412",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5696",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5728",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5728",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6130",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6130",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6136",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6136",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6156",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6156",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6197",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6197",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6198",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6198",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6213",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6213",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6327",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6327",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6480",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6480",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6516",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6516",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6828",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6828",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7042",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7042",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7097",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7097",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7913",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7913",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7914",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7914",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7915",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7915",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7916",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7916",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-8630",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8630",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-8632",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8632",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-8633",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8633",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-8645",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8645",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-8650",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8650",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-8658",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8658",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-8660",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8660",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9083",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9083",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9084",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9084",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9120",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9120",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9178",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9178",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9191",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9191",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9588",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9588",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9685",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9685",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9755",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9755",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9756",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9756",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12168",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12168",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-15102",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15102",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-18174",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18174",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2583",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2584",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2584",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2596",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2596",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2618",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2618",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-5549",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5549",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-5550",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5550",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-5551",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5551",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-5577",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5577",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-5967",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5967",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-5970",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5970",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-5986",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5986",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-6001",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6001",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-6214",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-6345",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6345",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-6348",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-6348",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-7495",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7495",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16597",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16597",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-11190",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11190",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-3901",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20261",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20261",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-std-def to version 4.9.16-alt1. \nSecurity Fix(es):\n\n * BDU:2016-01985: Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2016-01998: Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2016-02006: Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2016-02241: Уязвимость функции iowarrior_probe ядра операционной системы Linux, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-02351: Уязвимость функции ion_ioctl (drivers/staging/android/ion/ion.c) операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2017-00290: Уязвимость операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2017-00291: Уязвимость операционной системы Linux, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2017-00292: Уязвимость операционной системы Linux, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2017-00296: Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00297: Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-01557: Уязвимость компонента kernel/events/core.c ядра операционной системы, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2017-01558: Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01631: Уязвимость функции lock_fdc() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06413: Уязвимость подсистемы LLC ядра операционной системы Linux, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-03979: Уязвимость функции load_elf_binary() ядра операционной системы Linux, позволяющая нарушителю обойти механизм защиты ASLR и раскрыть защищаемую информацию\n\n * CVE-2014-9892: The snd_compr_tstamp function in sound/core/compress_offload.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize a timestamp data structure, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28770164 and Qualcomm internal bug CR568717.\n\n * CVE-2014-9900: The ethtool_get_wol function in net/core/ethtool.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not initialize a certain data structure, which allows local users to obtain sensitive information via a crafted application, aka Android internal bug 28803952 and Qualcomm internal bug CR570754.\n\n * CVE-2015-8839: Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling.\n\n * CVE-2015-8944: The ioresources_init function in kernel/resource.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 6 and 7 (2013) devices, uses weak permissions for /proc/iomem, which allows local users to obtain sensitive information by reading this file, aka Android internal bug 28814213 and Qualcomm internal bug CR786116. NOTE: the permissions may be intentional in most non-Android contexts.\n\n * CVE-2015-8952: The mbcache feature in the ext2 and ext4 filesystem implementations in the Linux kernel before 4.6 mishandles xattr block caching, which allows local users to cause a denial of service (soft lockup) via filesystem operations in environments that use many attributes, as demonstrated by Ceph and Samba.\n\n * CVE-2016-10147: crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).\n\n * CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.\n\n * CVE-2016-10318: A missing authorization check in the fscrypt_process_policy function in fs/crypto/policy.c in the ext4 and f2fs filesystem encryption support in the Linux kernel before 4.7.4 allows a user to assign an encryption policy to a directory owned by a different user, potentially creating a denial of service.\n\n * CVE-2016-10741: In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.\n\n * CVE-2016-10905: An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.\n\n * CVE-2016-10906: An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.\n\n * CVE-2016-10907: An issue was discovered in drivers/iio/dac/ad5755.c in the Linux kernel before 4.8.6. There is an out of bounds write in the function ad5755_parse_dt.\n\n * CVE-2016-1237: nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.\n\n * CVE-2016-1575: The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.\n\n * CVE-2016-1576: The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.\n\n * CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.\n\n * CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-2383: The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.\n\n * CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.\n\n * CVE-2016-3134: The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.\n\n * CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.\n\n * CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.\n\n * CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.\n\n * CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.\n\n * CVE-2016-3156: The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.\n\n * CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.\n\n * CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.\n\n * CVE-2016-3713: The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.\n\n * CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.\n\n * CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.\n\n * CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.\n\n * CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.\n\n * CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.\n\n * CVE-2016-4578: sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.\n\n * CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.\n\n * CVE-2016-4581: fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.\n\n * CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.\n\n * CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.\n\n * CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.\n\n * CVE-2016-5400: Memory leak in the airspy_probe function in drivers/media/usb/airspy/airspy.c in the airspy USB driver in the Linux kernel before 4.7 allows local users to cause a denial of service (memory consumption) via a crafted USB device that emulates many VFL_TYPE_SDR or VFL_TYPE_SUBDEV devices and performs many connect and disconnect operations.\n\n * CVE-2016-5412: arch/powerpc/kvm/book3s_hv_rmhandlers.S in the Linux kernel through 4.7 on PowerPC platforms, when CONFIG_KVM_BOOK3S_64_HV is enabled, allows guest OS users to cause a denial of service (host OS infinite loop) by making a H_CEDE hypercall during the existence of a suspended transaction.\n\n * CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.\n\n * CVE-2016-5728: Race condition in the vop_ioctl function in drivers/misc/mic/vop/vop_vringh.c in the MIC VOP driver in the Linux kernel before 4.6.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (memory corruption and system crash) by changing a certain header, aka a \"double fetch\" vulnerability.\n\n * CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.\n\n * CVE-2016-6136: Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a \"double fetch\" vulnerability.\n\n * CVE-2016-6156: Race condition in the ec_device_ioctl_xcmd function in drivers/platform/chrome/cros_ec_dev.c in the Linux kernel before 4.7 allows local users to cause a denial of service (out-of-bounds array access) by changing a certain size value, aka a \"double fetch\" vulnerability.\n\n * CVE-2016-6197: fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.\n\n * CVE-2016-6198: The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c.\n\n * CVE-2016-6213: fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.\n\n * CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.\n\n * CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.\n\n * CVE-2016-6516: Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a \"double fetch\" vulnerability.\n\n * CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.\n\n * CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.\n\n * CVE-2016-7097: The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.\n\n * CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.\n\n * CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.\n\n * CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.\n\n * CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.\n\n * CVE-2016-8630: The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction.\n\n * CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.\n\n * CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.\n\n * CVE-2016-8645: The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.\n\n * CVE-2016-8650: The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.\n\n * CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.\n\n * CVE-2016-8660: The XFS subsystem in the Linux kernel through 4.8.2 allows local users to cause a denial of service (fdatasync failure and system hang) by using the vfs syscall group in the trinity program, related to a \"page lock order bug in the XFS seek hole/data implementation.\"\n\n * CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \"state machine confusion bug.\"\n\n * CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.\n\n * CVE-2016-9120: Race condition in the ion_ioctl function in drivers/staging/android/ion/ion.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) by calling ION_IOC_FREE on two CPUs at the same time.\n\n * CVE-2016-9178: The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.\n\n * CVE-2016-9191: The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity.\n\n * CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.\n\n * CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.\n\n * CVE-2016-9755: The netfilter subsystem in the Linux kernel before 4.9 mishandles IPv6 reassembly, which allows local users to cause a denial of service (integer overflow, out-of-bounds write, and GPF) or possibly have unspecified other impact via a crafted application that makes socket, connect, and writev system calls, related to net/ipv6/netfilter/nf_conntrack_reasm.c and net/ipv6/netfilter/nf_defrag_ipv6_hooks.c.\n\n * CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.\n\n * CVE-2017-12168: The access_pmu_evcntr function in arch/arm64/kvm/sys_regs.c in the Linux kernel before 4.8.11 allows privileged KVM guest OS users to cause a denial of service (assertion failure and host OS crash) by accessing the Performance Monitors Cycle Count Register (PMCCNTR).\n\n * CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference.\n\n * CVE-2017-18174: In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.\n\n * CVE-2017-2583: The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.\n\n * CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.\n\n * CVE-2017-2596: The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel through 4.9.8 improperly emulates the VMXON instruction, which allows KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references.\n\n * CVE-2017-2618: A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.\n\n * CVE-2017-5549: The klsi_105_get_line_state function in drivers/usb/serial/kl5kusb105.c in the Linux kernel before 4.9.5 places uninitialized heap-memory contents into a log entry upon a failure to read the line status, which allows local users to obtain sensitive information by reading the log.\n\n * CVE-2017-5550: Off-by-one error in the pipe_advance function in lib/iov_iter.c in the Linux kernel before 4.9.5 allows local users to obtain sensitive information from uninitialized heap-memory locations in opportunistic circumstances by reading from a pipe after an incorrect buffer-release decision.\n\n * CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.\n\n * CVE-2017-5577: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call.\n\n * CVE-2017-5967: The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.\n\n * CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.\n\n * CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.\n\n * CVE-2017-6001: Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.\n\n * CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.\n\n * CVE-2017-6345: The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.\n\n * CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.\n\n * CVE-2017-7495: fs/ext4/inode.c in the Linux kernel before 4.6.2, when ext4 data=ordered mode is used, mishandles a needs-flushing-before-commit list, which allows local users to obtain sensitive information from other users' files in opportunistic circumstances by waiting for a hardware reset, creating a new file, making write system calls, and reading this file.\n\n * CVE-2018-16597: An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.\n\n * CVE-2019-11190: The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.\n\n * CVE-2019-3901: A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.\n\n * CVE-2021-20261: A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2017-03-22"
|
||
},
|
||
"Updated": {
|
||
"Date": "2017-03-22"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2016-01985",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-01985",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-01998",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-01998",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-02006",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-02006",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-02241",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-02241",
|
||
"Impact": "Low",
|
||
"Public": "20160318"
|
||
},
|
||
{
|
||
"ID": "BDU:2016-02351",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264, CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2016-02351",
|
||
"Impact": "High",
|
||
"Public": "20160311"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00290",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00290",
|
||
"Impact": "Low",
|
||
"Public": "20170110"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00291",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00291",
|
||
"Impact": "Low",
|
||
"Public": "20170114"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00292",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-532",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00292",
|
||
"Impact": "Low",
|
||
"Public": "20170110"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00296",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-399, CWE-772",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00296",
|
||
"Impact": "Low",
|
||
"Public": "20170205"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00297",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00297",
|
||
"Impact": "High",
|
||
"Public": "20170112"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01557",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01557",
|
||
"Impact": "High",
|
||
"Public": "20170114"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-01558",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362, CWE-617",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-01558",
|
||
"Impact": "Low",
|
||
"Public": "20170207"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01631",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01631",
|
||
"Impact": "Low",
|
||
"Public": "20160201"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06413",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06413",
|
||
"Impact": "High",
|
||
"Public": "20170212"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03979",
|
||
"CVSS": "AV:L/AC:M/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03979",
|
||
"Impact": "Low",
|
||
"Public": "20160831"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2014-9892",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9892",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-9900",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9900",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-8839",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8839",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-8944",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8944",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2015-8952",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8952",
|
||
"Impact": "Low",
|
||
"Public": "20161016"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10147",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10147",
|
||
"Impact": "Low",
|
||
"Public": "20170118"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10208",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10208",
|
||
"Impact": "Low",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10318",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10318",
|
||
"Impact": "Low",
|
||
"Public": "20170404"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10741",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10741",
|
||
"Impact": "Low",
|
||
"Public": "20190201"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10905",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10905",
|
||
"Impact": "High",
|
||
"Public": "20190819"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10906",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10906",
|
||
"Impact": "High",
|
||
"Public": "20190819"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10907",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10907",
|
||
"Impact": "High",
|
||
"Public": "20190819"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-1237",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1237",
|
||
"Impact": "Low",
|
||
"Public": "20160629"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-1575",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1575",
|
||
"Impact": "High",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-1576",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1576",
|
||
"Impact": "High",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2117",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2117",
|
||
"Impact": "High",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2184",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2184",
|
||
"Impact": "Low",
|
||
"Public": "20160427"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2185",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2185",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2186",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2186",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2187",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2187",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2188",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2188",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2383",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2383",
|
||
"Impact": "Low",
|
||
"Public": "20160427"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2782",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2782",
|
||
"Impact": "Low",
|
||
"Public": "20160427"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3134",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3134",
|
||
"Impact": "High",
|
||
"Public": "20160427"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3136",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3136",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3137",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3137",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3138",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3138",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3140",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3140",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3156",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3156",
|
||
"Impact": "Low",
|
||
"Public": "20160427"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3672",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3672",
|
||
"Impact": "High",
|
||
"Public": "20160427"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3689",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3689",
|
||
"Impact": "Low",
|
||
"Public": "20160502"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-3713",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3713",
|
||
"Impact": "High",
|
||
"Public": "20160627"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4470",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470",
|
||
"Impact": "Low",
|
||
"Public": "20160627"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4482",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4482",
|
||
"Impact": "Low",
|
||
"Public": "20160523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4485",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4485",
|
||
"Impact": "High",
|
||
"Public": "20160523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4486",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4486",
|
||
"Impact": "Low",
|
||
"Public": "20160523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4569",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4569",
|
||
"Impact": "Low",
|
||
"Public": "20160523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4578",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4578",
|
||
"Impact": "Low",
|
||
"Public": "20160523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4580",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4580",
|
||
"Impact": "High",
|
||
"Public": "20160523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4581",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4581",
|
||
"Impact": "Low",
|
||
"Public": "20160523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-4998",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4998",
|
||
"Impact": "High",
|
||
"Public": "20160703"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5243",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5243",
|
||
"Impact": "Low",
|
||
"Public": "20160627"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5244",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5244",
|
||
"Impact": "High",
|
||
"Public": "20160627"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5400",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5400",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5412",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5412",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5696",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5728",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5728",
|
||
"Impact": "Low",
|
||
"Public": "20160627"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6130",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6130",
|
||
"Impact": "Low",
|
||
"Public": "20160703"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6136",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6136",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6156",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6156",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6197",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6197",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6198",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6198",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6213",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6213",
|
||
"Impact": "Low",
|
||
"Public": "20161228"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6327",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6327",
|
||
"Impact": "Low",
|
||
"Public": "20161016"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6480",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6480",
|
||
"Impact": "Low",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6516",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6516",
|
||
"Impact": "High",
|
||
"Public": "20160806"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6828",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6828",
|
||
"Impact": "Low",
|
||
"Public": "20161016"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7042",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7042",
|
||
"Impact": "Low",
|
||
"Public": "20161016"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7097",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-285",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7097",
|
||
"Impact": "Low",
|
||
"Public": "20161016"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7913",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7913",
|
||
"Impact": "High",
|
||
"Public": "20161116"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7914",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7914",
|
||
"Impact": "Low",
|
||
"Public": "20161116"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7915",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7915",
|
||
"Impact": "Low",
|
||
"Public": "20161116"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7916",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7916",
|
||
"Impact": "Low",
|
||
"Public": "20161116"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-8630",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8630",
|
||
"Impact": "Low",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-8632",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8632",
|
||
"Impact": "High",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-8633",
|
||
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8633",
|
||
"Impact": "Low",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-8645",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8645",
|
||
"Impact": "Low",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-8650",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8650",
|
||
"Impact": "Low",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-8658",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8658",
|
||
"Impact": "Low",
|
||
"Public": "20161016"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-8660",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8660",
|
||
"Impact": "Low",
|
||
"Public": "20161016"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9083",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9083",
|
||
"Impact": "High",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9084",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9084",
|
||
"Impact": "High",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9120",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9120",
|
||
"Impact": "High",
|
||
"Public": "20161208"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9178",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9178",
|
||
"Impact": "Low",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9191",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9191",
|
||
"Impact": "Low",
|
||
"Public": "20161128"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9588",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-388",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9588",
|
||
"Impact": "Low",
|
||
"Public": "20161228"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9685",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9685",
|
||
"Impact": "Low",
|
||
"Public": "20161228"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9755",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9755",
|
||
"Impact": "High",
|
||
"Public": "20161228"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9756",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9756",
|
||
"Impact": "Low",
|
||
"Public": "20161228"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12168",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12168",
|
||
"Impact": "Low",
|
||
"Public": "20170920"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-15102",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15102",
|
||
"Impact": "Low",
|
||
"Public": "20171115"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-18174",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18174",
|
||
"Impact": "Critical",
|
||
"Public": "20180211"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2583",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583",
|
||
"Impact": "High",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2584",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2584",
|
||
"Impact": "High",
|
||
"Public": "20170115"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2596",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-772",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2596",
|
||
"Impact": "Low",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2618",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-193",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2618",
|
||
"Impact": "Low",
|
||
"Public": "20180727"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-5549",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-532",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5549",
|
||
"Impact": "Low",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-5550",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5550",
|
||
"Impact": "Low",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-5551",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5551",
|
||
"Impact": "Low",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-5577",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-388",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5577",
|
||
"Impact": "Low",
|
||
"Public": "20170206"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-5967",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5967",
|
||
"Impact": "Low",
|
||
"Public": "20170214"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-5970",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5970",
|
||
"Impact": "High",
|
||
"Public": "20170214"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-5986",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5986",
|
||
"Impact": "Low",
|
||
"Public": "20170218"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-6001",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6001",
|
||
"Impact": "High",
|
||
"Public": "20170218"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-6214",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214",
|
||
"Impact": "High",
|
||
"Public": "20170223"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-6345",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6345",
|
||
"Impact": "High",
|
||
"Public": "20170301"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-6348",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-6348",
|
||
"Impact": "Low",
|
||
"Public": "20170301"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-7495",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7495",
|
||
"Impact": "Low",
|
||
"Public": "20170515"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16597",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16597",
|
||
"Impact": "Low",
|
||
"Public": "20180921"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-11190",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11190",
|
||
"Impact": "Low",
|
||
"Public": "20190412"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-3901",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-3901",
|
||
"Impact": "Low",
|
||
"Public": "20190422"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20261",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20261",
|
||
"Impact": "Low",
|
||
"Public": "20210311"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330001",
|
||
"Comment": "kernel-doc-std is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330002",
|
||
"Comment": "kernel-headers-modules-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330003",
|
||
"Comment": "kernel-headers-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330004",
|
||
"Comment": "kernel-image-domU-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330005",
|
||
"Comment": "kernel-image-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330006",
|
||
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330007",
|
||
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330008",
|
||
"Comment": "kernel-modules-drm-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330009",
|
||
"Comment": "kernel-modules-ide-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330010",
|
||
"Comment": "kernel-modules-kvm-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330011",
|
||
"Comment": "kernel-modules-staging-std-def is earlier than 1:4.9.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20171330012",
|
||
"Comment": "kernel-modules-v4l-std-def is earlier than 1:4.9.16-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |