109 lines
4.0 KiB
JSON
109 lines
4.0 KiB
JSON
|
{
|
||
|
"Definition": [
|
||
|
{
|
||
|
"ID": "oval:org.altlinux.errata:def:20247016",
|
||
|
"Version": "oval:org.altlinux.errata:def:20247016",
|
||
|
"Class": "patch",
|
||
|
"Metadata": {
|
||
|
"Title": "ALT-PU-2024-7016: package `ctags` update to version 5.8-alt6",
|
||
|
"AffectedList": [
|
||
|
{
|
||
|
"Family": "unix",
|
||
|
"Platforms": [
|
||
|
"ALT Linux branch c10f2"
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"References": [
|
||
|
{
|
||
|
"RefID": "ALT-PU-2024-7016",
|
||
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-7016",
|
||
|
"Source": "ALTPU"
|
||
|
},
|
||
|
{
|
||
|
"RefID": "BDU:2023-07200",
|
||
|
"RefURL": "https://bdu.fstec.ru/vul/2023-07200",
|
||
|
"Source": "BDU"
|
||
|
},
|
||
|
{
|
||
|
"RefID": "CVE-2014-7204",
|
||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-7204",
|
||
|
"Source": "CVE"
|
||
|
},
|
||
|
{
|
||
|
"RefID": "CVE-2022-4515",
|
||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4515",
|
||
|
"Source": "CVE"
|
||
|
}
|
||
|
],
|
||
|
"Description": "This update upgrades ctags to version 5.8-alt6. \nSecurity Fix(es):\n\n * BDU:2023-07200: Уязвимость функции externalSortTags (sort.c) утилиты создания индексов файлов для исходного кода программы Exuberant Ctags, позволяющая нарушителю выполнить произвольные команды\n\n * CVE-2014-7204: jscript.c in Exuberant Ctags 5.8 allows remote attackers to cause a denial of service (infinite loop and CPU and disk consumption) via a crafted JavaScript file.\n\n * CVE-2022-4515: A flaw was found in Exuberant Ctags in the way it handles the \"-o\" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.",
|
||
|
"Advisory": {
|
||
|
"From": "errata.altlinux.org",
|
||
|
"Severity": "High",
|
||
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
|
"Issued": {
|
||
|
"Date": "2024-04-24"
|
||
|
},
|
||
|
"Updated": {
|
||
|
"Date": "2024-04-24"
|
||
|
},
|
||
|
"BDUs": [
|
||
|
{
|
||
|
"ID": "BDU:2023-07200",
|
||
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
|
"CWE": "CWE-78",
|
||
|
"Href": "https://bdu.fstec.ru/vul/2023-07200",
|
||
|
"Impact": "High",
|
||
|
"Public": "20221219"
|
||
|
}
|
||
|
],
|
||
|
"CVEs": [
|
||
|
{
|
||
|
"ID": "CVE-2014-7204",
|
||
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
|
"CWE": "CWE-399",
|
||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-7204",
|
||
|
"Impact": "Low",
|
||
|
"Public": "20141007"
|
||
|
},
|
||
|
{
|
||
|
"ID": "CVE-2022-4515",
|
||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
|
"CWE": "CWE-78",
|
||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4515",
|
||
|
"Impact": "High",
|
||
|
"Public": "20221220"
|
||
|
}
|
||
|
],
|
||
|
"AffectedCPEs": {
|
||
|
"CPEs": [
|
||
|
"cpe:/o:alt:spworkstation:10",
|
||
|
"cpe:/o:alt:spserver:10"
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
},
|
||
|
"Criteria": {
|
||
|
"Operator": "AND",
|
||
|
"Criterions": [
|
||
|
{
|
||
|
"TestRef": "oval:org.altlinux.errata:tst:5001",
|
||
|
"Comment": "ALT Linux must be installed"
|
||
|
}
|
||
|
],
|
||
|
"Criterias": [
|
||
|
{
|
||
|
"Operator": "OR",
|
||
|
"Criterions": [
|
||
|
{
|
||
|
"TestRef": "oval:org.altlinux.errata:tst:20247016001",
|
||
|
"Comment": "ctags is earlier than 0:5.8-alt6"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
}
|