ALT Vulnerability
This commit is contained in:
parent
1f0927a2cc
commit
1ef4cb6e8d
131
oval/c10f2/ALT-PU-2024-1685/definitions.json
Normal file
131
oval/c10f2/ALT-PU-2024-1685/definitions.json
Normal file
@ -0,0 +1,131 @@
|
||||
{
|
||||
"Definition": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:def:20241685",
|
||||
"Version": "oval:org.altlinux.errata:def:20241685",
|
||||
"Class": "patch",
|
||||
"Metadata": {
|
||||
"Title": "ALT-PU-2024-1685: package `squid` update to version 6.6-alt1",
|
||||
"AffectedList": [
|
||||
{
|
||||
"Family": "unix",
|
||||
"Platforms": [
|
||||
"ALT Linux branch c10f2"
|
||||
]
|
||||
}
|
||||
],
|
||||
"References": [
|
||||
{
|
||||
"RefID": "ALT-PU-2024-1685",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-1685",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2023-08827",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2023-08827",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2024-00895",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2024-00895",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2023-50269",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-50269",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-23638",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-23638",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades squid to version 6.6-alt1. \nSecurity Fix(es):\n\n * BDU:2023-08827: Уязвимость функции follow_x_forwarded_for() прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00895: Уязвимость прокси-сервера Squid, связанная с разыменованием указателя с истекшим сроком действия, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2023-50269: Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.\n\n * CVE-2024-23638: Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`.",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "High",
|
||||
"Rights": "Copyright 2023 BaseALT Ltd.",
|
||||
"Issued": {
|
||||
"Date": "2024-02-06"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2024-02-06"
|
||||
},
|
||||
"bdu": [
|
||||
{
|
||||
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"Cvss3": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"Cwe": "CWE-674",
|
||||
"Href": "https://bdu.fstec.ru/vul/2023-08827",
|
||||
"Impact": "High",
|
||||
"Public": "20231012",
|
||||
"CveID": "BDU:2023-08827"
|
||||
},
|
||||
{
|
||||
"Cvss": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||||
"Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"Cwe": "CWE-672, CWE-825",
|
||||
"Href": "https://bdu.fstec.ru/vul/2024-00895",
|
||||
"Impact": "Low",
|
||||
"Public": "20240123",
|
||||
"CveID": "BDU:2024-00895"
|
||||
}
|
||||
],
|
||||
"Cves": [
|
||||
{
|
||||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"Cwe": "CWE-674",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-50269",
|
||||
"Impact": "High",
|
||||
"Public": "20231214",
|
||||
"CveID": "CVE-2023-50269"
|
||||
},
|
||||
{
|
||||
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"Cwe": "CWE-672",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-23638",
|
||||
"Impact": "Low",
|
||||
"Public": "20240124",
|
||||
"CveID": "CVE-2024-23638"
|
||||
}
|
||||
],
|
||||
"AffectedCpeList": {
|
||||
"Cpe": [
|
||||
"cpe:/o:alt:spworkstation:10",
|
||||
"cpe:/o:alt:spserver:10"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Criteria": {
|
||||
"Operator": "AND",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:5001",
|
||||
"Comment": "ALT Linux must be installed"
|
||||
}
|
||||
],
|
||||
"Criterias": [
|
||||
{
|
||||
"Operator": "OR",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:20241685001",
|
||||
"Comment": "squid is earlier than 0:6.6-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:20241685002",
|
||||
"Comment": "squid-doc is earlier than 0:6.6-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:20241685003",
|
||||
"Comment": "squid-helpers is earlier than 0:6.6-alt1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
46
oval/c10f2/ALT-PU-2024-1685/objects.json
Normal file
46
oval/c10f2/ALT-PU-2024-1685/objects.json
Normal file
@ -0,0 +1,46 @@
|
||||
{
|
||||
"TextFileContent54Objects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:5001",
|
||||
"Version": "1",
|
||||
"comment": "Evaluate `/etc/os-release` file content",
|
||||
"Path": {
|
||||
"dataType": "string",
|
||||
"Text": "/etc"
|
||||
},
|
||||
"Filepath": {
|
||||
"Datatype": "string",
|
||||
"Text": "os-release"
|
||||
},
|
||||
"Pattern": {
|
||||
"Datatype": "string",
|
||||
"Operation": "pattern match",
|
||||
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
|
||||
},
|
||||
"Instance": {
|
||||
"Datatype": "int",
|
||||
"Text": "1"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RpmInfoObjects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:20241685001",
|
||||
"Version": "1",
|
||||
"comment": "squid is installed",
|
||||
"Name": "squid"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:20241685002",
|
||||
"Version": "1",
|
||||
"comment": "squid-doc is installed",
|
||||
"Name": "squid-doc"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:20241685003",
|
||||
"Version": "1",
|
||||
"comment": "squid-helpers is installed",
|
||||
"Name": "squid-helpers"
|
||||
}
|
||||
]
|
||||
}
|
23
oval/c10f2/ALT-PU-2024-1685/states.json
Normal file
23
oval/c10f2/ALT-PU-2024-1685/states.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"TextFileContent54State": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:5001",
|
||||
"Version": "1",
|
||||
"Text": {}
|
||||
}
|
||||
],
|
||||
"RpmInfoState": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:20241685001",
|
||||
"Version": "1",
|
||||
"Comment": "package EVR is earlier than 0:6.6-alt1",
|
||||
"Arch": {},
|
||||
"Evr": {
|
||||
"Text": "0:6.6-alt1",
|
||||
"Datatype": "evr_string",
|
||||
"Operation": "less than"
|
||||
},
|
||||
"Subexpression": {}
|
||||
}
|
||||
]
|
||||
}
|
54
oval/c10f2/ALT-PU-2024-1685/tests.json
Normal file
54
oval/c10f2/ALT-PU-2024-1685/tests.json
Normal file
@ -0,0 +1,54 @@
|
||||
{
|
||||
"TextFileContent54Tests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:5001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "ALT Linux based on branch 'c10f2' must be installed",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:5001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:5001"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoTests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:20241685001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "squid is earlier than 0:6.6-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:20241685001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:20241685001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:20241685002",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "squid-doc is earlier than 0:6.6-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:20241685002"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:20241685001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:20241685003",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "squid-helpers is earlier than 0:6.6-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:20241685003"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:20241685001"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
Loading…
Reference in New Issue
Block a user