1133 lines
63 KiB
JSON
1133 lines
63 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20151849",
|
|
"Version": "oval:org.altlinux.errata:def:20151849",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2015-1849: package `kernel-image-std-def` update to version 4.1.10-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p9"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2015-1849",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1849",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00886",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00886",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02097",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02097",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02098",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02098",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-02099",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-02099",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01093",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01093",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01159",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01159",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-01160",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-01160",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2018-00380",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2018-00380",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01341",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01341",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2022-00886",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00886",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-9410",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9410",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-9717",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9717",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-9940",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9940",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0275",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0275",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0568",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0568",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0572",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0572",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0573",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0573",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1328",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1328",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1333",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1333",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1350",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1350",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2150",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2150",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2666",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2666",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2672",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2672",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2830",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2830",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2922",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2922",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3212",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3212",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3288",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3288",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3290",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3290",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3291",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3291",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3339",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3339",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3636",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3636",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4001",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4001",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4167",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4167",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4176",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4176",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4177",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4177",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4178",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4178",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4692",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4692",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4700",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4700",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5157",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5157",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5366",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5366",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5697",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5697",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5706",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5706",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5707",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5707",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6252",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6252",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6526",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6526",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8019",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8019",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8215",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8215",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8950",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8950",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8955",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8955",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8967",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8967",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-9004",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-9004",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-9289",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-9289",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-0823",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0823",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2059",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2059",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2061",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2061",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2062",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2062",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2063",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2063",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2064",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2064",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2065",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2065",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2066",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2066",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2067",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2067",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2068",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2068",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5340",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5340",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5342",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5342",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5343",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5343",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5344",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5344",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-5870",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5870",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6786",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6786",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-6787",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6787",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-15868",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15868",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5972",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5972",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-16884",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-16995",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16995",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades kernel-image-std-def to version 4.1.10-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00886: Уязвимость ядра Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2016-02097: Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-02098: Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-02099: Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-01093: Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-01159: Уязвимость компонента kernel/events/core.c ядра операционной системы Android, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2017-01160: Уязвимость компонента drivers/regulator/core.c ядра операционной системы Android, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2018-00380: Уязвимость реализации TCP-стека операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01341: Уязвимость сервера NFS ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00886: Уязвимость функции ping_unhash (net/ipv4/ping.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании\n\n * CVE-2014-9410: The vfe31_proc_general function in drivers/media/video/msm/vfe/msm_vfe31.c in the MSM-VFE31 driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate a certain id value, which allows attackers to gain privileges or cause a denial of service (memory corruption) via an application that makes a crafted ioctl call.\n\n * CVE-2014-9717: fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.\n\n * CVE-2014-9940: The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.\n\n * CVE-2015-0275: The ext4_zero_range function in fs/ext4/extents.c in the Linux kernel before 4.1 allows local users to cause a denial of service (BUG) via a crafted fallocate zero-range request.\n\n * CVE-2015-0568: Use-after-free vulnerability in the msm_set_crop function in drivers/media/video/msm/msm_camera.c in the MSM-Camera driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (memory corruption) via an application that makes a crafted ioctl call.\n\n * CVE-2015-0572: Multiple race conditions in drivers/char/adsprpc.c and drivers/char/adsprpc_compat.c in the ADSPRPC driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (zero-value write) or possibly have unspecified other impact via a COMPAT_FASTRPC_IOCTL_INVOKE_FD ioctl call.\n\n * CVE-2015-0573: drivers/media/platform/msm/broadcast/tsc.c in the TSC driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via a crafted application that makes a TSC_GET_CARD_STATUS ioctl call.\n\n * CVE-2015-1328: The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.\n\n * CVE-2015-1333: Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.\n\n * CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.\n\n * CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.\n\n * CVE-2015-2666: Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.\n\n * CVE-2015-2672: The xsave/xrstor implementation in arch/x86/include/asm/xsave.h in the Linux kernel before 3.19.2 creates certain .altinstr_replacement pointers and consequently does not provide any protection against instruction faulting, which allows local users to cause a denial of service (panic) by triggering a fault, as demonstrated by an unaligned memory operand or a non-canonical address memory operand.\n\n * CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.\n\n * CVE-2015-2922: The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.\n\n * CVE-2015-3212: Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.\n\n * CVE-2015-3288: mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.\n\n * CVE-2015-3290: arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.\n\n * CVE-2015-3291: arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.\n\n * CVE-2015-3339: Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.\n\n * CVE-2015-3636: The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.\n\n * CVE-2015-4001: Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet.\n\n * CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.\n\n * CVE-2015-4176: fs/namespace.c in the Linux kernel before 4.0.2 does not properly support mount connectivity, which allows local users to read arbitrary files by leveraging user-namespace root access for deletion of a file or directory.\n\n * CVE-2015-4177: The collect_mounts function in fs/namespace.c in the Linux kernel before 4.0.5 does not properly consider that it may execute after a path has been unmounted, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call.\n\n * CVE-2015-4178: The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/linux/fs_pin.h.\n\n * CVE-2015-4692: The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.\n\n * CVE-2015-4700: The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.\n\n * CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.\n\n * CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.\n\n * CVE-2015-5697: The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.\n\n * CVE-2015-5706: Use-after-free vulnerability in the path_openat function in fs/namei.c in the Linux kernel 3.x and 4.x before 4.0.4 allows local users to cause a denial of service or possibly have unspecified other impact via O_TMPFILE filesystem operations that leverage a duplicate cleanup operation.\n\n * CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.\n\n * CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.\n\n * CVE-2015-6526: The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel before 4.0.2 on ppc64 platforms allows local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace.\n\n * CVE-2015-8019: The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and 3.18.22 does not accept a length argument, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call.\n\n * CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.\n\n * CVE-2015-8950: arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.\n\n * CVE-2015-8955: arch/arm64/kernel/perf_event.c in the Linux kernel before 4.1 on arm64 platforms allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via vectors involving events that are mishandled during a span of multiple HW PMUs.\n\n * CVE-2015-8967: arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the \"strict page permissions\" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.\n\n * CVE-2015-9004: kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions.\n\n * CVE-2015-9289: In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.\n\n * CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.\n\n * CVE-2016-2059: The msm_ipc_router_bind_control_port function in net/ipc_router/ipc_router_core.c in the IPC router kernel module for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not verify that a port is a client port, which allows attackers to gain privileges or cause a denial of service (race condition and list corruption) by making many BIND_CONTROL_PORT ioctl calls.\n\n * CVE-2016-2061: Integer signedness error in the MSM V4L2 video driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (array overflow and memory corruption) via a crafted application that triggers an msm_isp_axi_create_stream call.\n\n * CVE-2016-2062: The adreno_perfcounter_query_group function in drivers/gpu/msm/adreno_perfcounter.c in the Adreno GPU driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, uses an incorrect integer data type, which allows attackers to cause a denial of service (integer overflow, heap-based buffer overflow, and incorrect memory allocation) or possibly have unspecified other impact via a crafted IOCTL_KGSL_PERFCOUNTER_QUERY ioctl call.\n\n * CVE-2016-2063: Stack-based buffer overflow in the supply_lm_input_write function in drivers/thermal/supply_lm_core.c in the MSM Thermal driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted application that sends a large amount of data through the debugfs interface.\n\n * CVE-2016-2064: sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted application that makes an ioctl call specifying many commands.\n\n * CVE-2016-2065: sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (out-of-bounds write and memory corruption) or possibly have unspecified other impact via a crafted application that makes an ioctl call triggering incorrect use of a parameters pointer.\n\n * CVE-2016-2066: Integer signedness error in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application that makes an ioctl call.\n\n * CVE-2016-2067: drivers/gpu/msm/kgsl.c in the MSM graphics driver (aka GPU driver) for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, mishandles the KGSL_MEMFLAGS_GPUREADONLY flag, which allows attackers to gain privileges by leveraging accidental read-write mappings, aka Qualcomm internal bug CR988993.\n\n * CVE-2016-2068: The MSM QDSP6 audio driver (aka sound driver) for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (integer overflow, and buffer overflow or buffer over-read) via a crafted application that performs a (1) AUDIO_EFFECTS_WRITE or (2) AUDIO_EFFECTS_READ operation, aka Qualcomm internal bug CR1006609.\n\n * CVE-2016-5340: The is_ashmem_file function in drivers/staging/android/ashmem.c in a certain Qualcomm Innovation Center (QuIC) Android patch for the Linux kernel 3.x mishandles pointer validation within the KGSL Linux Graphics Module, which allows attackers to bypass intended access restrictions by using the /ashmem string as the dentry name.\n\n * CVE-2016-5342: Heap-based buffer overflow in the wcnss_wlan_write function in drivers/net/wireless/wcnss/wcnss_wlan.c in the wcnss_wlan device driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service or possibly have unspecified other impact by writing to /dev/wcnss_wlan with an unexpected amount of data.\n\n * CVE-2016-5343: drivers/soc/qcom/qdsp6v2/voice_svc.c in the QDSP6v2 Voice Service driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write request, as demonstrated by a voice_svc_send_req buffer overflow.\n\n * CVE-2016-5344: Multiple integer overflows in the MDSS driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service or possibly have unspecified other impact via a large size value, related to mdss_compat_utils.c, mdss_fb.c, and mdss_rotator.c.\n\n * CVE-2016-5870: The msm_ipc_router_close function in net/ipc_router/ipc_router_socket.c in the ipc_router component for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact by triggering failure of an accept system call for an AF_MSM_IPC socket.\n\n * CVE-2016-6786: kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 30955111.\n\n * CVE-2016-6787: kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 31095224.\n\n * CVE-2017-15868: The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.\n\n * CVE-2017-5972: The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.\n\n * CVE-2018-16884: A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.\n\n * CVE-2019-16995: In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2015-10-09"
|
|
},
|
|
"Updated": {
|
|
"Date": "2015-10-09"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2016-00886",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00886",
|
|
"Impact": "Low",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02097",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02097",
|
|
"Impact": "Critical",
|
|
"Public": "20160808"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02098",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02098",
|
|
"Impact": "Critical",
|
|
"Public": "20160808"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-02099",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-02099",
|
|
"Impact": "Critical",
|
|
"Public": "20160808"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01093",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01093",
|
|
"Impact": "Low",
|
|
"Public": "20170404"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01159",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01159",
|
|
"Impact": "Critical",
|
|
"Public": "20170503"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-01160",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-01160",
|
|
"Impact": "High",
|
|
"Public": "20170503"
|
|
},
|
|
{
|
|
"ID": "BDU:2018-00380",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399, CWE-400",
|
|
"Href": "https://bdu.fstec.ru/vul/2018-00380",
|
|
"Impact": "High",
|
|
"Public": "20151003"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-01341",
|
|
"CVSS": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01341",
|
|
"Impact": "High",
|
|
"Public": "20181217"
|
|
},
|
|
{
|
|
"ID": "BDU:2022-00886",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2022-00886",
|
|
"Impact": "Low",
|
|
"Public": "20150805"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2014-9410",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9410",
|
|
"Impact": "Critical",
|
|
"Public": "20160807"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-9717",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9717",
|
|
"Impact": "Low",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-9940",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9940",
|
|
"Impact": "High",
|
|
"Public": "20170502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0275",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0275",
|
|
"Impact": "Low",
|
|
"Public": "20151019"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0568",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0568",
|
|
"Impact": "High",
|
|
"Public": "20160807"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0572",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0572",
|
|
"Impact": "High",
|
|
"Public": "20161010"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0573",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0573",
|
|
"Impact": "Critical",
|
|
"Public": "20160807"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1328",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1328",
|
|
"Impact": "High",
|
|
"Public": "20161128"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1333",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1333",
|
|
"Impact": "Low",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1350",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-552",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1350",
|
|
"Impact": "Low",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2150",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2150",
|
|
"Impact": "Low",
|
|
"Public": "20150312"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2666",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2666",
|
|
"Impact": "Low",
|
|
"Public": "20150527"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2672",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2672",
|
|
"Impact": "Low",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2830",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2830",
|
|
"Impact": "Low",
|
|
"Public": "20150527"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2922",
|
|
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2922",
|
|
"Impact": "Low",
|
|
"Public": "20150527"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3212",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3212",
|
|
"Impact": "Low",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3288",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3288",
|
|
"Impact": "High",
|
|
"Public": "20161016"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3290",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3290",
|
|
"Impact": "High",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3291",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3291",
|
|
"Impact": "Low",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3339",
|
|
"CVSS": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3339",
|
|
"Impact": "Low",
|
|
"Public": "20150527"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3636",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3636",
|
|
"Impact": "Low",
|
|
"Public": "20150806"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4001",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4001",
|
|
"Impact": "Critical",
|
|
"Public": "20150607"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4167",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4167",
|
|
"Impact": "Low",
|
|
"Public": "20150805"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4176",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4176",
|
|
"Impact": "Low",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4177",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4177",
|
|
"Impact": "Low",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4178",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4178",
|
|
"Impact": "Low",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4692",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4692",
|
|
"Impact": "Low",
|
|
"Public": "20150727"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4700",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4700",
|
|
"Impact": "Low",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5157",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5157",
|
|
"Impact": "High",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5366",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5366",
|
|
"Impact": "Low",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5697",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5697",
|
|
"Impact": "Low",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5706",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5706",
|
|
"Impact": "Low",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5707",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5707",
|
|
"Impact": "Low",
|
|
"Public": "20151019"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6252",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6252",
|
|
"Impact": "Low",
|
|
"Public": "20151019"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6526",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6526",
|
|
"Impact": "Low",
|
|
"Public": "20150831"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8019",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8019",
|
|
"Impact": "High",
|
|
"Public": "20160502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8215",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8215",
|
|
"Impact": "Low",
|
|
"Public": "20151116"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8950",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8950",
|
|
"Impact": "Low",
|
|
"Public": "20161010"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8955",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8955",
|
|
"Impact": "High",
|
|
"Public": "20161010"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8967",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8967",
|
|
"Impact": "High",
|
|
"Public": "20161208"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-9004",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-9004",
|
|
"Impact": "High",
|
|
"Public": "20170502"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-9289",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-9289",
|
|
"Impact": "Low",
|
|
"Public": "20190727"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-0823",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0823",
|
|
"Impact": "Low",
|
|
"Public": "20160312"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2059",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2059",
|
|
"Impact": "High",
|
|
"Public": "20160505"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2061",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2061",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2062",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2062",
|
|
"Impact": "High",
|
|
"Public": "20160505"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2063",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2063",
|
|
"Impact": "High",
|
|
"Public": "20160807"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2064",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2064",
|
|
"Impact": "High",
|
|
"Public": "20160807"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2065",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2065",
|
|
"Impact": "High",
|
|
"Public": "20160807"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2066",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2066",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2067",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-269",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2067",
|
|
"Impact": "High",
|
|
"Public": "20160711"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2068",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2068",
|
|
"Impact": "High",
|
|
"Public": "20160711"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5340",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5340",
|
|
"Impact": "High",
|
|
"Public": "20160807"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5342",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-787",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5342",
|
|
"Impact": "High",
|
|
"Public": "20160830"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5343",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5343",
|
|
"Impact": "Critical",
|
|
"Public": "20161010"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5344",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5344",
|
|
"Impact": "Critical",
|
|
"Public": "20160830"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-5870",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5870",
|
|
"Impact": "High",
|
|
"Public": "20170404"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6786",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6786",
|
|
"Impact": "High",
|
|
"Public": "20161228"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-6787",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6787",
|
|
"Impact": "High",
|
|
"Public": "20161228"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-15868",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15868",
|
|
"Impact": "High",
|
|
"Public": "20171205"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5972",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-400",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5972",
|
|
"Impact": "High",
|
|
"Public": "20170214"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-16884",
|
|
"CVSS": "AV:A/AC:L/Au:S/C:P/I:P/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884",
|
|
"Impact": "High",
|
|
"Public": "20181218"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-16995",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-401",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16995",
|
|
"Impact": "High",
|
|
"Public": "20190930"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:9",
|
|
"cpe:/o:alt:workstation:9",
|
|
"cpe:/o:alt:server:9",
|
|
"cpe:/o:alt:server-v:9",
|
|
"cpe:/o:alt:education:9",
|
|
"cpe:/o:alt:slinux:9",
|
|
"cpe:/o:alt:starterkit:p9",
|
|
"cpe:/o:alt:kworkstation:9.1",
|
|
"cpe:/o:alt:workstation:9.1",
|
|
"cpe:/o:alt:server:9.1",
|
|
"cpe:/o:alt:server-v:9.1",
|
|
"cpe:/o:alt:education:9.1",
|
|
"cpe:/o:alt:slinux:9.1",
|
|
"cpe:/o:alt:starterkit:9.1",
|
|
"cpe:/o:alt:kworkstation:9.2",
|
|
"cpe:/o:alt:workstation:9.2",
|
|
"cpe:/o:alt:server:9.2",
|
|
"cpe:/o:alt:server-v:9.2",
|
|
"cpe:/o:alt:education:9.2",
|
|
"cpe:/o:alt:slinux:9.2",
|
|
"cpe:/o:alt:starterkit:9.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849001",
|
|
"Comment": "kernel-doc-std is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849002",
|
|
"Comment": "kernel-headers-modules-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849003",
|
|
"Comment": "kernel-headers-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849004",
|
|
"Comment": "kernel-image-domU-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849005",
|
|
"Comment": "kernel-image-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849006",
|
|
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849007",
|
|
"Comment": "kernel-modules-drm-radeon-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849008",
|
|
"Comment": "kernel-modules-drm-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849009",
|
|
"Comment": "kernel-modules-ide-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849010",
|
|
"Comment": "kernel-modules-kvm-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849011",
|
|
"Comment": "kernel-modules-staging-std-def is earlier than 1:4.1.10-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151849012",
|
|
"Comment": "kernel-modules-v4l-std-def is earlier than 1:4.1.10-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |