2024-12-12 21:07:30 +00:00

812 lines
44 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161262",
"Version": "oval:org.altlinux.errata:def:20161262",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1262: package `kernel-image-un-def` update to version 4.5.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1262",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1262",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-00513",
"RefURL": "https://bdu.fstec.ru/vul/2016-00513",
"Source": "BDU"
},
{
"RefID": "BDU:2017-00894",
"RefURL": "https://bdu.fstec.ru/vul/2017-00894",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00574",
"RefURL": "https://bdu.fstec.ru/vul/2018-00574",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00575",
"RefURL": "https://bdu.fstec.ru/vul/2018-00575",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00576",
"RefURL": "https://bdu.fstec.ru/vul/2018-00576",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02196",
"RefURL": "https://bdu.fstec.ru/vul/2019-02196",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04515",
"RefURL": "https://bdu.fstec.ru/vul/2019-04515",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04676",
"RefURL": "https://bdu.fstec.ru/vul/2019-04676",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04677",
"RefURL": "https://bdu.fstec.ru/vul/2019-04677",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00236",
"RefURL": "https://bdu.fstec.ru/vul/2020-00236",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01595",
"RefURL": "https://bdu.fstec.ru/vul/2020-01595",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02427",
"RefURL": "https://bdu.fstec.ru/vul/2020-02427",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01631",
"RefURL": "https://bdu.fstec.ru/vul/2021-01631",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02663",
"RefURL": "https://bdu.fstec.ru/vul/2021-02663",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03057",
"RefURL": "https://bdu.fstec.ru/vul/2021-03057",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03088",
"RefURL": "https://bdu.fstec.ru/vul/2021-03088",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03095",
"RefURL": "https://bdu.fstec.ru/vul/2021-03095",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03177",
"RefURL": "https://bdu.fstec.ru/vul/2021-03177",
"Source": "BDU"
},
{
"RefID": "CVE-2015-8839",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8839",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8964",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8964",
"Source": "CVE"
},
{
"RefID": "CVE-2016-0758",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0758",
"Source": "CVE"
},
{
"RefID": "CVE-2016-10229",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10229",
"Source": "CVE"
},
{
"RefID": "CVE-2016-10906",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10906",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2085",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2085",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2383",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2383",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2384",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2384",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2550",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2550",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2782",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2782",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2847",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2847",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5828",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5828",
"Source": "CVE"
},
{
"RefID": "CVE-2016-7917",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7917",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16911",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16911",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16912",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16912",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16913",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16913",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16914",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16914",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11479",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11815",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11815",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14821",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14835",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14835",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15902",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15902",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16995",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16995",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18805",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10732",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12114",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114",
"Source": "CVE"
},
{
"RefID": "CVE-2020-24586",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"Source": "CVE"
},
{
"RefID": "CVE-2020-24587",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"Source": "CVE"
},
{
"RefID": "CVE-2020-24588",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"Source": "CVE"
},
{
"RefID": "CVE-2020-26147",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"Source": "CVE"
},
{
"RefID": "CVE-2021-20261",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20261",
"Source": "CVE"
}
],
"Description": "This update upgrades kernel-image-un-def to version 4.5.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00513: Уязвимость драйвера USB-MIDI ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2017-00894: Уязвимость компонента udp.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-00574: Уязвимость функции stub_send_ret_submit ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00575: Уязвимость функции stub_recv_cmd_submit ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00576: Уязвимость функции get_pipe ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02196: Уязвимость ядра операционной системы Linux, вызванная ошибками при обработке сегментов минимального размера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04515: Уязвимость функции dwc3_pci_probe() (drivers/usb/dwc3/dwc3-pci.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04676: Уязвимость ядра Linux, связанная с переполнения буфера виртуальной памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2019-04677: Уязвимость функции Coalesced_MMIO ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-00236: Уязвимость подсистемы ptrace ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2020-01595: Уязвимость функции rds_tcp_kill_sock ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-02427: Уязвимость функции pivot_root (fs/namespace.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01631: Уязвимость функции lock_fdc() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02663: Уязвимость набора стандартов связи для коммуникации IEEE 802.11 операционной системы Windows, позволяющая нарушителю внедрить произвольные сетевые пакеты\n\n * BDU:2021-03057: Уязвимость функции fill_thread_core_info() ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию и вызвать отказ в обслуживании\n\n * BDU:2021-03088: Уязвимость реализации алгоритмов WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03095: Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 набора стандартов связи для коммуникации IEEE 802.11, позволяющая нарушителю внедрить произвольные сетевые пакеты и/или оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03177: Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * CVE-2015-8839: Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling.\n\n * CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.\n\n * CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.\n\n * CVE-2016-10229: udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.\n\n * CVE-2016-10906: An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.\n\n * CVE-2016-2085: The evm_verify_hmac function in security/integrity/evm/evm_main.c in the Linux kernel before 4.5 does not properly copy data, which makes it easier for local users to forge MAC values via a timing side-channel attack.\n\n * CVE-2016-2383: The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.\n\n * CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.\n\n * CVE-2016-2550: The Linux kernel before 4.5 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by leveraging incorrect tracking of descriptor ownership and sending each descriptor over a UNIX socket before closing it. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-4312.\n\n * CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.\n\n * CVE-2016-2847: fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.\n\n * CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.\n\n * CVE-2016-7917: The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.\n\n * CVE-2017-16911: The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.\n\n * CVE-2017-16912: The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.\n\n * CVE-2017-16913: The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.\n\n * CVE-2017-16914: The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.\n\n * CVE-2019-11479: Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.\n\n * CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.\n\n * CVE-2019-14821: An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-\u003efirst' and 'ring-\u003elast' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.\n\n * CVE-2019-14835: A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.\n\n * CVE-2019-15902: A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.\n\n * CVE-2019-16995: In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.\n\n * CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.\n\n * CVE-2020-10732: A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.\n\n * CVE-2020-12114: A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.\n\n * CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.\n\n * CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.\n\n * CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.\n\n * CVE-2020-26147: An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.\n\n * CVE-2021-20261: A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-03-17"
},
"Updated": {
"Date": "2016-03-17"
},
"BDUs": [
{
"ID": "BDU:2016-00513",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-00513",
"Impact": "Low",
"Public": "20160213"
},
{
"ID": "BDU:2017-00894",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://bdu.fstec.ru/vul/2017-00894",
"Impact": "Critical",
"Public": "20160104"
},
{
"ID": "BDU:2018-00574",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2018-00574",
"Impact": "Low",
"Public": "20171208"
},
{
"ID": "BDU:2018-00575",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00575",
"Impact": "Low",
"Public": "20171208"
},
{
"ID": "BDU:2018-00576",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2018-00576",
"Impact": "Low",
"Public": "20171208"
},
{
"ID": "BDU:2019-02196",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-405, CWE-770",
"Href": "https://bdu.fstec.ru/vul/2019-02196",
"Impact": "High",
"Public": "20190615"
},
{
"ID": "BDU:2019-04515",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2019-04515",
"Impact": "Critical",
"Public": "20190417"
},
{
"ID": "BDU:2019-04676",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2019-04676",
"Impact": "High",
"Public": "20190911"
},
{
"ID": "BDU:2019-04677",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04677",
"Impact": "High",
"Public": "20190918"
},
{
"ID": "BDU:2020-00236",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-00236",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "BDU:2020-01595",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01595",
"Impact": "High",
"Public": "20190328"
},
{
"ID": "BDU:2020-02427",
"CVSS": "AV:L/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-02427",
"Impact": "Low",
"Public": "20200504"
},
{
"ID": "BDU:2021-01631",
"CVSS": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2021-01631",
"Impact": "Low",
"Public": "20160201"
},
{
"ID": "BDU:2021-02663",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-306, CWE-327",
"Href": "https://bdu.fstec.ru/vul/2021-02663",
"Impact": "Low",
"Public": "20210510"
},
{
"ID": "BDU:2021-03057",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"CWE": "CWE-200, CWE-908",
"Href": "https://bdu.fstec.ru/vul/2021-03057",
"Impact": "Low",
"Public": "20200528"
},
{
"ID": "BDU:2021-03088",
"CVSS": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-326, CWE-327",
"Href": "https://bdu.fstec.ru/vul/2021-03088",
"Impact": "Low",
"Public": "20210510"
},
{
"ID": "BDU:2021-03095",
"CVSS": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-03095",
"Impact": "Low",
"Public": "20210510"
},
{
"ID": "BDU:2021-03177",
"CVSS": "AV:A/AC:H/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-03177",
"Impact": "Low",
"Public": "20210510"
}
],
"CVEs": [
{
"ID": "CVE-2015-8839",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8839",
"Impact": "Low",
"Public": "20160502"
},
{
"ID": "CVE-2015-8964",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8964",
"Impact": "Low",
"Public": "20161116"
},
{
"ID": "CVE-2016-0758",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0758",
"Impact": "High",
"Public": "20160627"
},
{
"ID": "CVE-2016-10229",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-358",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10229",
"Impact": "Critical",
"Public": "20170404"
},
{
"ID": "CVE-2016-10906",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10906",
"Impact": "High",
"Public": "20190819"
},
{
"ID": "CVE-2016-2085",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-19",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2085",
"Impact": "Low",
"Public": "20160427"
},
{
"ID": "CVE-2016-2383",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2383",
"Impact": "Low",
"Public": "20160427"
},
{
"ID": "CVE-2016-2384",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2384",
"Impact": "Low",
"Public": "20160427"
},
{
"ID": "CVE-2016-2550",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2550",
"Impact": "Low",
"Public": "20160427"
},
{
"ID": "CVE-2016-2782",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2782",
"Impact": "Low",
"Public": "20160427"
},
{
"ID": "CVE-2016-2847",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2847",
"Impact": "Low",
"Public": "20160427"
},
{
"ID": "CVE-2016-5828",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5828",
"Impact": "High",
"Public": "20160627"
},
{
"ID": "CVE-2016-7917",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7917",
"Impact": "Low",
"Public": "20161116"
},
{
"ID": "CVE-2017-16911",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16911",
"Impact": "Low",
"Public": "20180131"
},
{
"ID": "CVE-2017-16912",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16912",
"Impact": "Low",
"Public": "20180131"
},
{
"ID": "CVE-2017-16913",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16913",
"Impact": "Low",
"Public": "20180131"
},
{
"ID": "CVE-2017-16914",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16914",
"Impact": "Low",
"Public": "20180131"
},
{
"ID": "CVE-2019-11479",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"Impact": "High",
"Public": "20190619"
},
{
"ID": "CVE-2019-11815",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11815",
"Impact": "High",
"Public": "20190508"
},
{
"ID": "CVE-2019-14821",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821",
"Impact": "High",
"Public": "20190919"
},
{
"ID": "CVE-2019-14835",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14835",
"Impact": "High",
"Public": "20190917"
},
{
"ID": "CVE-2019-15902",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15902",
"Impact": "Low",
"Public": "20190904"
},
{
"ID": "CVE-2019-16995",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16995",
"Impact": "High",
"Public": "20190930"
},
{
"ID": "CVE-2019-18805",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805",
"Impact": "Critical",
"Public": "20191107"
},
{
"ID": "CVE-2020-10732",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
"Impact": "Low",
"Public": "20200612"
},
{
"ID": "CVE-2020-12114",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114",
"Impact": "Low",
"Public": "20200504"
},
{
"ID": "CVE-2020-24586",
"CVSS": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"Impact": "Low",
"Public": "20210511"
},
{
"ID": "CVE-2020-24587",
"CVSS": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-327",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"Impact": "Low",
"Public": "20210511"
},
{
"ID": "CVE-2020-24588",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-327",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"Impact": "Low",
"Public": "20210511"
},
{
"ID": "CVE-2020-26147",
"CVSS": "AV:A/AC:H/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"Impact": "Low",
"Public": "20210511"
},
{
"ID": "CVE-2021-20261",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20261",
"Impact": "Low",
"Public": "20210311"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161262001",
"Comment": "kernel-doc-un is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262002",
"Comment": "kernel-headers-modules-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262003",
"Comment": "kernel-headers-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262004",
"Comment": "kernel-image-domU-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262005",
"Comment": "kernel-image-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262006",
"Comment": "kernel-modules-drm-nouveau-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262007",
"Comment": "kernel-modules-drm-radeon-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262008",
"Comment": "kernel-modules-drm-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262009",
"Comment": "kernel-modules-ide-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262010",
"Comment": "kernel-modules-kvm-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262011",
"Comment": "kernel-modules-staging-un-def is earlier than 1:4.5.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161262012",
"Comment": "kernel-modules-v4l-un-def is earlier than 1:4.5.0-alt1"
}
]
}
]
}
}
]
}