578 lines
32 KiB
JSON
578 lines
32 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20211446",
|
||
"Version": "oval:org.altlinux.errata:def:20211446",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-1446: package `kernel-image-mp` update to version 5.10.16-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-1446",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1446",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-05539",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-05539",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-05831",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-05831",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-00014",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-00014",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01126",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01126",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01616",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01616",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01617",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01617",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02587",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02587",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02591",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02591",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02592",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02592",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-02593",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-02593",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03443",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03443",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02505",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02505",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05916",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05916",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07048",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07048",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00628",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00628",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01284",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01284",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-02799",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-02799",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-25656",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25656",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-25705",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-27777",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-28374",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-29569",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-29569",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36158",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36322",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36385",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36694",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20268",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20268",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-26708",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-26708",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3178",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3178",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3347",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3348",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3411",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3411",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-0240",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1390",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades kernel-image-mp to version 5.10.16-alt1. \nSecurity Fix(es):\n\n * BDU:2020-05539: Уязвимость ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-05831: Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-00014: Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-01126: Уязвимость реализации сокетов с адресацией AF_VSOCK ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2021-01616: Уязвимость реализации функций dev_map_init_map и sock_map_alloc ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы или повысить свои привилегии\n\n * BDU:2021-01617: Уязвимость функции can_optimize (arch/x86/kernel/kprobes/opt.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-02587: Уязвимость драйверов drivers/target/target_core_xcopy.c ядра операционной системы Linux, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2021-02591: Уязвимость функции ndb_queue_rq ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-02592: Уязвимость компонента fs/nfsd/nfs3xdr.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-02593: Уязвимость компонента PI futexes ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код на уровне ядра\n\n * BDU:2021-03443: Уязвимость компонента RTAS ядра операционной системы Linux, связанная с отсутствием механизма авторизации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02505: Уязвимость реализации файловой системы FUSE ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05916: Уязвимость компонента drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-07048: Уязвимость функции mwifiex_cmd_802_11_ad_hoc_start() драйвера marvell ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00628: Уязвимость функции io_prep_async_work() подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2023-01284: Уязвимость реализации протокола TIPC (Transparent Inter Process Communication) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-02799: Уязвимость функции xt_replace_table() в модуле net/netfilter/x_tables.c межсетевого экрана netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2020-25656: A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.\n\n * CVE-2020-25705: A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version\n\n * CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.\n\n * CVE-2020-28374: In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.\n\n * CVE-2020-29569: An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.\n\n * CVE-2020-36158: mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.\n\n * CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.\n\n * CVE-2020-36385: An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.\n\n * CVE-2020-36694: An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.\n\n * CVE-2021-20268: An out-of-bounds access flaw was found in the Linux kernel's implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2021-26708: A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.\n\n * CVE-2021-3178: fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to prevent this attack; see also the exports(5) no_subtree_check default behavior\n\n * CVE-2021-3347: An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.\n\n * CVE-2021-3348: nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.\n\n * CVE-2021-3411: A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2023-0240: There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.\n\nIn the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.\n\n * CVE-2023-1390: A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2023 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-03-08"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-03-08"
|
||
},
|
||
"bdu": [
|
||
{
|
||
"Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
|
||
"Cvss3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||
"Cwe": "CWE-330",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-05539",
|
||
"Impact": "High",
|
||
"Public": "20201104",
|
||
"CveID": "BDU:2020-05539"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:H/Au:N/C:C/I:N/A:N",
|
||
"Cvss3": "AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-05831",
|
||
"Impact": "Low",
|
||
"Public": "20201016",
|
||
"CveID": "BDU:2020-05831"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"Cwe": "CWE-252",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-00014",
|
||
"Impact": "High",
|
||
"Public": "20201215",
|
||
"CveID": "BDU:2021-00014"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01126",
|
||
"Impact": "High",
|
||
"Public": "20210205",
|
||
"CveID": "BDU:2021-01126"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01616",
|
||
"Impact": "High",
|
||
"Public": "20210129",
|
||
"CveID": "BDU:2021-01616"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-94",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01617",
|
||
"Impact": "Low",
|
||
"Public": "20210126",
|
||
"CveID": "BDU:2021-01617"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||
"Cwe": "CWE-22",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02587",
|
||
"Impact": "Low",
|
||
"Public": "20210113",
|
||
"CveID": "BDU:2021-02587"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02591",
|
||
"Impact": "High",
|
||
"Public": "20210131",
|
||
"CveID": "BDU:2021-02591"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:L/Au:S/C:C/I:C/A:N",
|
||
"Cvss3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||
"Cwe": "CWE-22",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02592",
|
||
"Impact": "Low",
|
||
"Public": "20210119",
|
||
"CveID": "BDU:2021-02592"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-02593",
|
||
"Impact": "High",
|
||
"Public": "20210129",
|
||
"CveID": "BDU:2021-02593"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-862",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03443",
|
||
"Impact": "Low",
|
||
"Public": "20200820",
|
||
"CveID": "BDU:2021-03443"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"Cwe": "CWE-404, CWE-459",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02505",
|
||
"Impact": "Low",
|
||
"Public": "20201210",
|
||
"CveID": "BDU:2022-02505"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05916",
|
||
"Impact": "High",
|
||
"Public": "20200914",
|
||
"CveID": "BDU:2022-05916"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07048",
|
||
"Impact": "Low",
|
||
"Public": "20201208",
|
||
"CveID": "BDU:2022-07048"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00628",
|
||
"Impact": "High",
|
||
"Public": "20210221",
|
||
"CveID": "BDU:2023-00628"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"Cwe": "CWE-476, CWE-1050",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01284",
|
||
"Impact": "High",
|
||
"Public": "20210109",
|
||
"CveID": "BDU:2023-01284"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||
"Cwe": "CWE-362, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-02799",
|
||
"Impact": "Critical",
|
||
"Public": "20210315",
|
||
"CveID": "BDU:2023-02799"
|
||
}
|
||
],
|
||
"Cves": [
|
||
{
|
||
"Cvss": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25656",
|
||
"Impact": "Low",
|
||
"Public": "20201202",
|
||
"CveID": "CVE-2020-25656"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||
"Cwe": "CWE-330",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705",
|
||
"Impact": "High",
|
||
"Public": "20201117",
|
||
"CveID": "CVE-2020-25705"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
|
||
"Impact": "Low",
|
||
"Public": "20201215",
|
||
"CveID": "CVE-2020-27777"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"Cwe": "CWE-22",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-28374",
|
||
"Impact": "High",
|
||
"Public": "20210113",
|
||
"CveID": "CVE-2020-28374"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-29569",
|
||
"Impact": "High",
|
||
"Public": "20201215",
|
||
"CveID": "CVE-2020-29569"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
|
||
"Impact": "Low",
|
||
"Public": "20210105",
|
||
"CveID": "CVE-2020-36158"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"Cwe": "CWE-459",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322",
|
||
"Impact": "Low",
|
||
"Public": "20210414",
|
||
"CveID": "CVE-2020-36322"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
|
||
"Impact": "High",
|
||
"Public": "20210607",
|
||
"CveID": "CVE-2020-36385"
|
||
},
|
||
{
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694",
|
||
"Impact": "Low",
|
||
"Public": "20230521",
|
||
"CveID": "CVE-2020-36694"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20268",
|
||
"Impact": "High",
|
||
"Public": "20210309",
|
||
"CveID": "CVE-2021-20268"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-26708",
|
||
"Impact": "High",
|
||
"Public": "20210205",
|
||
"CveID": "CVE-2021-26708"
|
||
},
|
||
{
|
||
"Cvss": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||
"Cwe": "CWE-22",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3178",
|
||
"Impact": "Low",
|
||
"Public": "20210119",
|
||
"CveID": "CVE-2021-3178"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
|
||
"Impact": "High",
|
||
"Public": "20210129",
|
||
"CveID": "CVE-2021-3347"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
|
||
"Impact": "High",
|
||
"Public": "20210201",
|
||
"CveID": "CVE-2021-3348"
|
||
},
|
||
{
|
||
"Cvss": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-94",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3411",
|
||
"Impact": "Low",
|
||
"Public": "20210309",
|
||
"CveID": "CVE-2021-3411"
|
||
},
|
||
{
|
||
"Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"Cwe": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240",
|
||
"Impact": "High",
|
||
"Public": "20230130",
|
||
"CveID": "CVE-2023-0240"
|
||
},
|
||
{
|
||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"Cwe": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390",
|
||
"Impact": "High",
|
||
"Public": "20230316",
|
||
"CveID": "CVE-2023-1390"
|
||
}
|
||
],
|
||
"AffectedCpeList": {
|
||
"Cpe": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211446001",
|
||
"Comment": "kernel-headers-modules-mp is earlier than 0:5.10.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211446002",
|
||
"Comment": "kernel-headers-mp is earlier than 0:5.10.16-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211446003",
|
||
"Comment": "kernel-image-mp is earlier than 0:5.10.16-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |