ALT Vulnerability

This commit is contained in:
Иван Пепеляев 2024-12-29 03:06:03 +00:00
parent 5d5385312a
commit 36783732e2
48 changed files with 4330 additions and 0 deletions

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,76 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:5001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417181001",
"Version": "1",
"Comment": "libcrypto1.1 is installed",
"Name": "libcrypto1.1"
},
{
"ID": "oval:org.altlinux.errata:obj:202417181002",
"Version": "1",
"Comment": "libssl-devel is installed",
"Name": "libssl-devel"
},
{
"ID": "oval:org.altlinux.errata:obj:202417181003",
"Version": "1",
"Comment": "libssl-devel-static is installed",
"Name": "libssl-devel-static"
},
{
"ID": "oval:org.altlinux.errata:obj:202417181004",
"Version": "1",
"Comment": "libssl1.1 is installed",
"Name": "libssl1.1"
},
{
"ID": "oval:org.altlinux.errata:obj:202417181005",
"Version": "1",
"Comment": "openssl is installed",
"Name": "openssl"
},
{
"ID": "oval:org.altlinux.errata:obj:202417181006",
"Version": "1",
"Comment": "openssl-doc is installed",
"Name": "openssl-doc"
},
{
"ID": "oval:org.altlinux.errata:obj:202417181007",
"Version": "1",
"Comment": "openssl-engines is installed",
"Name": "openssl-engines"
},
{
"ID": "oval:org.altlinux.errata:obj:202417181008",
"Version": "1",
"Comment": "tsget is installed",
"Name": "tsget"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:5001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417181001",
"Version": "1",
"Comment": "package EVR is earlier than 0:1.1.1w-alt0.p10.2",
"Arch": {},
"EVR": {
"Text": "0:1.1.1w-alt0.p10.2",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,114 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:5001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:5001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:5001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417181001",
"Version": "1",
"Check": "all",
"Comment": "libcrypto1.1 is earlier than 0:1.1.1w-alt0.p10.2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417181001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417181001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417181002",
"Version": "1",
"Check": "all",
"Comment": "libssl-devel is earlier than 0:1.1.1w-alt0.p10.2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417181002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417181001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417181003",
"Version": "1",
"Check": "all",
"Comment": "libssl-devel-static is earlier than 0:1.1.1w-alt0.p10.2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417181003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417181001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417181004",
"Version": "1",
"Check": "all",
"Comment": "libssl1.1 is earlier than 0:1.1.1w-alt0.p10.2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417181004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417181001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417181005",
"Version": "1",
"Check": "all",
"Comment": "openssl is earlier than 0:1.1.1w-alt0.p10.2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417181005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417181001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417181006",
"Version": "1",
"Check": "all",
"Comment": "openssl-doc is earlier than 0:1.1.1w-alt0.p10.2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417181006"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417181001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417181007",
"Version": "1",
"Check": "all",
"Comment": "openssl-engines is earlier than 0:1.1.1w-alt0.p10.2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417181007"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417181001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417181008",
"Version": "1",
"Check": "all",
"Comment": "tsget is earlier than 0:1.1.1w-alt0.p10.2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417181008"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417181001"
}
}
]
}

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,70 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:5001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417672001",
"Version": "1",
"Comment": "openquantumsafe-openssh is installed",
"Name": "openquantumsafe-openssh"
},
{
"ID": "oval:org.altlinux.errata:obj:202417672002",
"Version": "1",
"Comment": "openquantumsafe-openssh-askpass-common is installed",
"Name": "openquantumsafe-openssh-askpass-common"
},
{
"ID": "oval:org.altlinux.errata:obj:202417672003",
"Version": "1",
"Comment": "openquantumsafe-openssh-clients is installed",
"Name": "openquantumsafe-openssh-clients"
},
{
"ID": "oval:org.altlinux.errata:obj:202417672004",
"Version": "1",
"Comment": "openquantumsafe-openssh-common is installed",
"Name": "openquantumsafe-openssh-common"
},
{
"ID": "oval:org.altlinux.errata:obj:202417672005",
"Version": "1",
"Comment": "openquantumsafe-openssh-keysign is installed",
"Name": "openquantumsafe-openssh-keysign"
},
{
"ID": "oval:org.altlinux.errata:obj:202417672006",
"Version": "1",
"Comment": "openquantumsafe-openssh-server is installed",
"Name": "openquantumsafe-openssh-server"
},
{
"ID": "oval:org.altlinux.errata:obj:202417672007",
"Version": "1",
"Comment": "openquantumsafe-openssh-server-control is installed",
"Name": "openquantumsafe-openssh-server-control"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:5001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417672001",
"Version": "1",
"Comment": "package EVR is earlier than 0:8.9p1.202310-alt3",
"Arch": {},
"EVR": {
"Text": "0:8.9p1.202310-alt3",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,102 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:5001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:5001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:5001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417672001",
"Version": "1",
"Check": "all",
"Comment": "openquantumsafe-openssh is earlier than 0:8.9p1.202310-alt3",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417672001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417672001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417672002",
"Version": "1",
"Check": "all",
"Comment": "openquantumsafe-openssh-askpass-common is earlier than 0:8.9p1.202310-alt3",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417672002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417672001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417672003",
"Version": "1",
"Check": "all",
"Comment": "openquantumsafe-openssh-clients is earlier than 0:8.9p1.202310-alt3",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417672003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417672001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417672004",
"Version": "1",
"Check": "all",
"Comment": "openquantumsafe-openssh-common is earlier than 0:8.9p1.202310-alt3",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417672004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417672001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417672005",
"Version": "1",
"Check": "all",
"Comment": "openquantumsafe-openssh-keysign is earlier than 0:8.9p1.202310-alt3",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417672005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417672001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417672006",
"Version": "1",
"Check": "all",
"Comment": "openquantumsafe-openssh-server is earlier than 0:8.9p1.202310-alt3",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417672006"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417672001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417672007",
"Version": "1",
"Check": "all",
"Comment": "openquantumsafe-openssh-server-control is earlier than 0:8.9p1.202310-alt3",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417672007"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417672001"
}
}
]
}

View File

@ -0,0 +1,91 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202417674",
"Version": "oval:org.altlinux.errata:def:202417674",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-17674: package `liboqs` update to version 0.12.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-17674",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-17674",
"Source": "ALTPU"
},
{
"RefID": "CVE-2024-54137",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-54137",
"Source": "CVE"
}
],
"Description": "This update upgrades liboqs to version 0.12.0-alt1. \nSecurity Fix(es):\n\n * CVE-2024-54137: liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. A correctness error has been identified in the reference implementation of the HQC key encapsulation mechanism. Due to an indexing error, part of the secret key is incorrectly treated as non-secret data. This results in an incorrect shared secret value being returned when the decapsulation function is called with a malformed ciphertext. This vulnerability is fixed in 0.12.0.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2024-54137",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-54137",
"Impact": "None",
"Public": "20241206"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202417674001",
"Comment": "liboqs is earlier than 0:0.12.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417674002",
"Comment": "liboqs-devel is earlier than 0:0.12.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417674003",
"Comment": "liboqs-tests is earlier than 0:0.12.0-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,46 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:5001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417674001",
"Version": "1",
"Comment": "liboqs is installed",
"Name": "liboqs"
},
{
"ID": "oval:org.altlinux.errata:obj:202417674002",
"Version": "1",
"Comment": "liboqs-devel is installed",
"Name": "liboqs-devel"
},
{
"ID": "oval:org.altlinux.errata:obj:202417674003",
"Version": "1",
"Comment": "liboqs-tests is installed",
"Name": "liboqs-tests"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:5001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417674001",
"Version": "1",
"Comment": "package EVR is earlier than 0:0.12.0-alt1",
"Arch": {},
"EVR": {
"Text": "0:0.12.0-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,54 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:5001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:5001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:5001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417674001",
"Version": "1",
"Check": "all",
"Comment": "liboqs is earlier than 0:0.12.0-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417674001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417674001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417674002",
"Version": "1",
"Check": "all",
"Comment": "liboqs-devel is earlier than 0:0.12.0-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417674002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417674001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417674003",
"Version": "1",
"Check": "all",
"Comment": "liboqs-tests is earlier than 0:0.12.0-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417674003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417674001"
}
}
]
}

View File

@ -0,0 +1,117 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202417682",
"Version": "oval:org.altlinux.errata:def:202417682",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-17682: package `cjson` update to version 1.7.18-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-17682",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-17682",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-01768",
"RefURL": "https://bdu.fstec.ru/vul/2024-01768",
"Source": "BDU"
},
{
"RefID": "CVE-2023-50471",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-50471",
"Source": "CVE"
},
{
"RefID": "CVE-2023-50472",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-50472",
"Source": "CVE"
}
],
"Description": "This update upgrades cjson to version 1.7.18-alt1. \nSecurity Fix(es):\n\n * BDU:2024-01768: Уязвимость функции cJSON_InsertItemInArray библиотеки для обработки JSON файлов на языке С JSON-C, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2023-50471: cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_InsertItemInArray at cJSON.c.\n\n * CVE-2023-50472: cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_SetValuestring at cJSON.c.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": [
{
"ID": "BDU:2024-01768",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2024-01768",
"Impact": "High",
"Public": "20231204"
}
],
"CVEs": [
{
"ID": "CVE-2023-50471",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-50471",
"Impact": "High",
"Public": "20231214"
},
{
"ID": "CVE-2023-50472",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-50472",
"Impact": "High",
"Public": "20231214"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202417682001",
"Comment": "libcjson is earlier than 0:1.7.18-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417682002",
"Comment": "libcjson-devel is earlier than 0:1.7.18-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,40 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:5001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417682001",
"Version": "1",
"Comment": "libcjson is installed",
"Name": "libcjson"
},
{
"ID": "oval:org.altlinux.errata:obj:202417682002",
"Version": "1",
"Comment": "libcjson-devel is installed",
"Name": "libcjson-devel"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:5001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417682001",
"Version": "1",
"Comment": "package EVR is earlier than 0:1.7.18-alt1",
"Arch": {},
"EVR": {
"Text": "0:1.7.18-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,42 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:5001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:5001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:5001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417682001",
"Version": "1",
"Check": "all",
"Comment": "libcjson is earlier than 0:1.7.18-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417682001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417682001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417682002",
"Version": "1",
"Check": "all",
"Comment": "libcjson-devel is earlier than 0:1.7.18-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417682002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417682001"
}
}
]
}

View File

@ -0,0 +1,157 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202417791",
"Version": "oval:org.altlinux.errata:def:202417791",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-17791: package `vault` update to version 1.13.12-alt6",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-17791",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-17791",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-06667",
"RefURL": "https://bdu.fstec.ru/vul/2024-06667",
"Source": "BDU"
},
{
"RefID": "BDU:2024-09085",
"RefURL": "https://bdu.fstec.ru/vul/2024-09085",
"Source": "BDU"
},
{
"RefID": "BDU:2024-09147",
"RefURL": "https://bdu.fstec.ru/vul/2024-09147",
"Source": "BDU"
},
{
"RefID": "CVE-2024-6468",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6468",
"Source": "CVE"
},
{
"RefID": "CVE-2024-8185",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8185",
"Source": "CVE"
},
{
"RefID": "CVE-2024-9180",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9180",
"Source": "CVE"
}
],
"Description": "This update upgrades vault to version 1.13.12-alt6. \nSecurity Fix(es):\n\n * BDU:2024-06667: Уязвимость платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, связанная с неправильной проверкой или обработкой исключительных условий, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-09085: Уязвимость алгоритма распределения данных Raft Consensus Algorithm хранилища Integrated storage (Raft) платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-09147: Уязвимость платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, связанная с неправильным назначением привилегий, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2024-6468: Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not listed in proxy_protocol_authorized_addrs, the Vault API server would shut down and no longer respond to any HTTP requests, potentially resulting in denial of service.\n\nWhile this bug also affected versions of Vault up to 1.17.1 and 1.16.5, a separate regression in those release series did not allow Vault operators to configure the deny_unauthorized option, thus not allowing the conditions for the denial of service to occur.\n\nFixed in Vault and Vault Enterprise 1.17.2, 1.16.6, and 1.15.12.\n\n * CVE-2024-8185: Vault Community and Vault Enterprise (“Vault”) clusters using Vaults Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.\n\nThis vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.\n\n * CVE-2024-9180: A privileged Vault operator with write permissions to the root namespaces identity endpoint could escalate their own or another users privileges to Vaults root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16.\n\n * #52418: Необходимо закрыть CVE-2024-8185, CVE-2024-9180, CVE-2024-6468",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": [
{
"ID": "BDU:2024-06667",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-703",
"Href": "https://bdu.fstec.ru/vul/2024-06667",
"Impact": "High",
"Public": "20240711"
},
{
"ID": "BDU:2024-09085",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-636",
"Href": "https://bdu.fstec.ru/vul/2024-09085",
"Impact": "High",
"Public": "20241031"
},
{
"ID": "BDU:2024-09147",
"CVSS": "AV:N/AC:L/Au:M/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-266",
"Href": "https://bdu.fstec.ru/vul/2024-09147",
"Impact": "High",
"Public": "20241010"
}
],
"CVEs": [
{
"ID": "CVE-2024-6468",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6468",
"Impact": "None",
"Public": "20240711"
},
{
"ID": "CVE-2024-8185",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8185",
"Impact": "None",
"Public": "20241031"
},
{
"ID": "CVE-2024-9180",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9180",
"Impact": "High",
"Public": "20241010"
}
],
"Bugzilla": [
{
"ID": "52418",
"Href": "https://bugzilla.altlinux.org/52418",
"Data": "Необходимо закрыть CVE-2024-8185, CVE-2024-9180, CVE-2024-6468"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202417791001",
"Comment": "vault is earlier than 0:1.13.12-alt6"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,34 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:5001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417791001",
"Version": "1",
"Comment": "vault is installed",
"Name": "vault"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:5001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417791001",
"Version": "1",
"Comment": "package EVR is earlier than 0:1.13.12-alt6",
"Arch": {},
"EVR": {
"Text": "0:1.13.12-alt6",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,30 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:5001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:5001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:5001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417791001",
"Version": "1",
"Check": "all",
"Comment": "vault is earlier than 0:1.13.12-alt6",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417791001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417791001"
}
}
]
}

View File

@ -0,0 +1,157 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202417177",
"Version": "oval:org.altlinux.errata:def:202417177",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-17177: package `vault` update to version 1.13.12-alt6",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-17177",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-17177",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-06667",
"RefURL": "https://bdu.fstec.ru/vul/2024-06667",
"Source": "BDU"
},
{
"RefID": "BDU:2024-09085",
"RefURL": "https://bdu.fstec.ru/vul/2024-09085",
"Source": "BDU"
},
{
"RefID": "BDU:2024-09147",
"RefURL": "https://bdu.fstec.ru/vul/2024-09147",
"Source": "BDU"
},
{
"RefID": "CVE-2024-6468",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-6468",
"Source": "CVE"
},
{
"RefID": "CVE-2024-8185",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8185",
"Source": "CVE"
},
{
"RefID": "CVE-2024-9180",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-9180",
"Source": "CVE"
}
],
"Description": "This update upgrades vault to version 1.13.12-alt6. \nSecurity Fix(es):\n\n * BDU:2024-06667: Уязвимость платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, связанная с неправильной проверкой или обработкой исключительных условий, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-09085: Уязвимость алгоритма распределения данных Raft Consensus Algorithm хранилища Integrated storage (Raft) платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-09147: Уязвимость платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, связанная с неправильным назначением привилегий, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2024-6468: Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not listed in proxy_protocol_authorized_addrs, the Vault API server would shut down and no longer respond to any HTTP requests, potentially resulting in denial of service.\n\nWhile this bug also affected versions of Vault up to 1.17.1 and 1.16.5, a separate regression in those release series did not allow Vault operators to configure the deny_unauthorized option, thus not allowing the conditions for the denial of service to occur.\n\nFixed in Vault and Vault Enterprise 1.17.2, 1.16.6, and 1.15.12.\n\n * CVE-2024-8185: Vault Community and Vault Enterprise (“Vault”) clusters using Vaults Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.\n\nThis vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12.\n\n * CVE-2024-9180: A privileged Vault operator with write permissions to the root namespaces identity endpoint could escalate their own or another users privileges to Vaults root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16.\n\n * #52418: Необходимо закрыть CVE-2024-8185, CVE-2024-9180, CVE-2024-6468",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": [
{
"ID": "BDU:2024-06667",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-703",
"Href": "https://bdu.fstec.ru/vul/2024-06667",
"Impact": "High",
"Public": "20240711"
},
{
"ID": "BDU:2024-09085",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-636",
"Href": "https://bdu.fstec.ru/vul/2024-09085",
"Impact": "High",
"Public": "20241031"
},
{
"ID": "BDU:2024-09147",
"CVSS": "AV:N/AC:L/Au:M/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-266",
"Href": "https://bdu.fstec.ru/vul/2024-09147",
"Impact": "High",
"Public": "20241010"
}
],
"CVEs": [
{
"ID": "CVE-2024-6468",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-6468",
"Impact": "None",
"Public": "20240711"
},
{
"ID": "CVE-2024-8185",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8185",
"Impact": "None",
"Public": "20241031"
},
{
"ID": "CVE-2024-9180",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-9180",
"Impact": "High",
"Public": "20241010"
}
],
"Bugzilla": [
{
"ID": "52418",
"Href": "https://bugzilla.altlinux.org/52418",
"Data": "Необходимо закрыть CVE-2024-8185, CVE-2024-9180, CVE-2024-6468"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202417177001",
"Comment": "vault is earlier than 0:1.13.12-alt6"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,34 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:4001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d\\.\\d)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417177001",
"Version": "1",
"Comment": "vault is installed",
"Name": "vault"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:4001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417177001",
"Version": "1",
"Comment": "package EVR is earlier than 0:1.13.12-alt6",
"Arch": {},
"EVR": {
"Text": "0:1.13.12-alt6",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,30 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:4001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c9f2' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:4001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417177001",
"Version": "1",
"Check": "all",
"Comment": "vault is earlier than 0:1.13.12-alt6",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417177001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417177001"
}
}
]
}

View File

@ -0,0 +1,116 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202417781",
"Version": "oval:org.altlinux.errata:def:202417781",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-17781: package `SDL2` update to version 2.0.22-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-17781",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-17781",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-01494",
"RefURL": "https://bdu.fstec.ru/vul/2024-01494",
"Source": "BDU"
},
{
"RefID": "CVE-2021-33657",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33657",
"Source": "CVE"
}
],
"Description": "This update upgrades SDL2 to version 2.0.22-alt1. \nSecurity Fix(es):\n\n * BDU:2024-01494: Уязвимость компонента src/video/SDL_pixels.c библиотеки Simple DirectMedia Layer, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2021-33657: There is a heap overflow problem in video/SDL_pixels.c in SDL (Simple DirectMedia Layer) 2.x to 2.0.18 versions. By crafting a malicious .BMP file, an attacker can cause the application using this library to crash, denial of service or Code execution.\n\n * #41301: Отсутствуют статические компоненты",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": [
{
"ID": "BDU:2024-01494",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2024-01494",
"Impact": "High",
"Public": "20211130"
}
],
"CVEs": [
{
"ID": "CVE-2021-33657",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33657",
"Impact": "High",
"Public": "20220401"
}
],
"Bugzilla": [
{
"ID": "41301",
"Href": "https://bugzilla.altlinux.org/41301",
"Data": "Отсутствуют статические компоненты"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202417781001",
"Comment": "libSDL2 is earlier than 0:2.0.22-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417781002",
"Comment": "libSDL2-devel is earlier than 0:2.0.22-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417781003",
"Comment": "libSDL2-devel-static is earlier than 0:2.0.22-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,46 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:4001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d\\.\\d)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417781001",
"Version": "1",
"Comment": "libSDL2 is installed",
"Name": "libSDL2"
},
{
"ID": "oval:org.altlinux.errata:obj:202417781002",
"Version": "1",
"Comment": "libSDL2-devel is installed",
"Name": "libSDL2-devel"
},
{
"ID": "oval:org.altlinux.errata:obj:202417781003",
"Version": "1",
"Comment": "libSDL2-devel-static is installed",
"Name": "libSDL2-devel-static"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:4001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417781001",
"Version": "1",
"Comment": "package EVR is earlier than 0:2.0.22-alt1",
"Arch": {},
"EVR": {
"Text": "0:2.0.22-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,54 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:4001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c9f2' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:4001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417781001",
"Version": "1",
"Check": "all",
"Comment": "libSDL2 is earlier than 0:2.0.22-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417781001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417781001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417781002",
"Version": "1",
"Check": "all",
"Comment": "libSDL2-devel is earlier than 0:2.0.22-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417781002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417781001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417781003",
"Version": "1",
"Check": "all",
"Comment": "libSDL2-devel-static is earlier than 0:2.0.22-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417781003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417781001"
}
}
]
}

View File

@ -0,0 +1,117 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202416941",
"Version": "oval:org.altlinux.errata:def:202416941",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-16941: package `cloud-init` update to version 24.2-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-16941",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-16941",
"Source": "ALTPU"
},
{
"RefID": "CVE-2023-1786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1786",
"Source": "CVE"
}
],
"Description": "This update upgrades cloud-init to version 24.2-alt2. \nSecurity Fix(es):\n\n * CVE-2023-1786: Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.\n\n * #52029: Bug in downstream altlinux",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2023-1786",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1786",
"Impact": "Low",
"Public": "20230426"
}
],
"Bugzilla": [
{
"ID": "52029",
"Href": "https://bugzilla.altlinux.org/52029",
"Data": "Bug in downstream altlinux"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202416941001",
"Comment": "cloud-init is earlier than 0:24.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202416941002",
"Comment": "cloud-init-config-etcnet is earlier than 0:24.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202416941003",
"Comment": "cloud-init-config-netplan is earlier than 0:24.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202416941004",
"Comment": "cloud-init-config-network-manager is earlier than 0:24.2-alt2"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,52 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:2001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202416941001",
"Version": "1",
"Comment": "cloud-init is installed",
"Name": "cloud-init"
},
{
"ID": "oval:org.altlinux.errata:obj:202416941002",
"Version": "1",
"Comment": "cloud-init-config-etcnet is installed",
"Name": "cloud-init-config-etcnet"
},
{
"ID": "oval:org.altlinux.errata:obj:202416941003",
"Version": "1",
"Comment": "cloud-init-config-netplan is installed",
"Name": "cloud-init-config-netplan"
},
{
"ID": "oval:org.altlinux.errata:obj:202416941004",
"Version": "1",
"Comment": "cloud-init-config-network-manager is installed",
"Name": "cloud-init-config-network-manager"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:2001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202416941001",
"Version": "1",
"Comment": "package EVR is earlier than 0:24.2-alt2",
"Arch": {},
"EVR": {
"Text": "0:24.2-alt2",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,66 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:2001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'p10' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:2001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202416941001",
"Version": "1",
"Check": "all",
"Comment": "cloud-init is earlier than 0:24.2-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202416941001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202416941001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202416941002",
"Version": "1",
"Check": "all",
"Comment": "cloud-init-config-etcnet is earlier than 0:24.2-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202416941002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202416941001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202416941003",
"Version": "1",
"Check": "all",
"Comment": "cloud-init-config-netplan is earlier than 0:24.2-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202416941003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202416941001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202416941004",
"Version": "1",
"Check": "all",
"Comment": "cloud-init-config-network-manager is earlier than 0:24.2-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202416941004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202416941001"
}
}
]
}

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,100 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:2001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417099001",
"Version": "1",
"Comment": "kernel-doc-std is installed",
"Name": "kernel-doc-std"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099002",
"Version": "1",
"Comment": "kernel-headers-modules-std-def is installed",
"Name": "kernel-headers-modules-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099003",
"Version": "1",
"Comment": "kernel-headers-std-def is installed",
"Name": "kernel-headers-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099004",
"Version": "1",
"Comment": "kernel-image-domU-std-def is installed",
"Name": "kernel-image-domU-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099005",
"Version": "1",
"Comment": "kernel-image-std-def is installed",
"Name": "kernel-image-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099006",
"Version": "1",
"Comment": "kernel-image-std-def-checkinstall is installed",
"Name": "kernel-image-std-def-checkinstall"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099007",
"Version": "1",
"Comment": "kernel-modules-drm-ancient-std-def is installed",
"Name": "kernel-modules-drm-ancient-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099008",
"Version": "1",
"Comment": "kernel-modules-drm-nouveau-std-def is installed",
"Name": "kernel-modules-drm-nouveau-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099009",
"Version": "1",
"Comment": "kernel-modules-drm-std-def is installed",
"Name": "kernel-modules-drm-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099010",
"Version": "1",
"Comment": "kernel-modules-ide-std-def is installed",
"Name": "kernel-modules-ide-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099011",
"Version": "1",
"Comment": "kernel-modules-midgard-be-m1000-std-def is installed",
"Name": "kernel-modules-midgard-be-m1000-std-def"
},
{
"ID": "oval:org.altlinux.errata:obj:202417099012",
"Version": "1",
"Comment": "kernel-modules-staging-std-def is installed",
"Name": "kernel-modules-staging-std-def"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:2001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417099001",
"Version": "1",
"Comment": "package EVR is earlier than 2:5.10.231-alt1",
"Arch": {},
"EVR": {
"Text": "2:5.10.231-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,162 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:2001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'p10' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:2001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417099001",
"Version": "1",
"Check": "all",
"Comment": "kernel-doc-std is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099002",
"Version": "1",
"Check": "all",
"Comment": "kernel-headers-modules-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099003",
"Version": "1",
"Check": "all",
"Comment": "kernel-headers-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099004",
"Version": "1",
"Check": "all",
"Comment": "kernel-image-domU-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099005",
"Version": "1",
"Check": "all",
"Comment": "kernel-image-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099006",
"Version": "1",
"Check": "all",
"Comment": "kernel-image-std-def-checkinstall is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099006"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099007",
"Version": "1",
"Check": "all",
"Comment": "kernel-modules-drm-ancient-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099007"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099008",
"Version": "1",
"Check": "all",
"Comment": "kernel-modules-drm-nouveau-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099008"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099009",
"Version": "1",
"Check": "all",
"Comment": "kernel-modules-drm-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099009"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099010",
"Version": "1",
"Check": "all",
"Comment": "kernel-modules-ide-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099010"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099011",
"Version": "1",
"Check": "all",
"Comment": "kernel-modules-midgard-be-m1000-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099011"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417099012",
"Version": "1",
"Check": "all",
"Comment": "kernel-modules-staging-std-def is earlier than 2:5.10.231-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417099012"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417099001"
}
}
]
}

View File

@ -0,0 +1,234 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202417456",
"Version": "oval:org.altlinux.errata:def:202417456",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-17456: package `vim` update to version 9.1.0917-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-17456",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-17456",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-06299",
"RefURL": "https://bdu.fstec.ru/vul/2024-06299",
"Source": "BDU"
},
{
"RefID": "BDU:2024-06478",
"RefURL": "https://bdu.fstec.ru/vul/2024-06478",
"Source": "BDU"
},
{
"RefID": "BDU:2024-07097",
"RefURL": "https://bdu.fstec.ru/vul/2024-07097",
"Source": "BDU"
},
{
"RefID": "CVE-2024-41957",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-41957",
"Source": "CVE"
},
{
"RefID": "CVE-2024-41965",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-41965",
"Source": "CVE"
},
{
"RefID": "CVE-2024-43374",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-43374",
"Source": "CVE"
},
{
"RefID": "CVE-2024-45306",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-45306",
"Source": "CVE"
}
],
"Description": "This update upgrades vim to version 9.1.0917-alt2. \nSecurity Fix(es):\n\n * BDU:2024-06299: Уязвимость компонента File Name Handler текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-06478: Уязвимость функции tagstack_clear_entry() файла src/alloc.c текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2024-07097: Уязвимость функции alist_add() текстового редактора vim, позволяющая нарушителю выполнить произвольные автокоманды\n\n * CVE-2024-41957: Vim is an open source command line text editor. Vim \u003c v9.1.0647 has double free in src/alloc.c:616. When closing a window, the corresponding tagstack data will be cleared and freed. However a bit later, the quickfix list belonging to that window will also be cleared and if that quickfix list points to the same tagstack data, Vim will try to free it again, resulting in a double-free/use-after-free access exception. Impact is low since the user must intentionally execute vim with several non-default flags,\nbut it may cause a crash of Vim. The issue has been fixed as of Vim patch v9.1.0647\n\n * CVE-2024-41965: Vim is an open source command line text editor. double-free in dialog_changed() in Vim \u003c v9.1.0648. When abandoning a buffer, Vim may ask the user what to do with the modified buffer. If the user wants the changed buffer to be saved, Vim may create a new Untitled file, if the buffer did not have a name yet. However, when setting the buffer name to Unnamed, Vim will falsely free a pointer twice, leading to a double-free and possibly later to a heap-use-after-free, which can lead to a crash. The issue has been fixed as of Vim patch v9.1.0648.\n\n * CVE-2024-43374: The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.\n\n * CVE-2024-45306: Vim is an open source, command line text editor. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by pointing beyond the end of\na line. Back then we assumed this loop is unnecessary. However, this change made it possible that the cursor position stays invalid and points beyond the end of a line, which would eventually cause a heap-buffer-overflow when trying to access the line pointer at\nthe specified cursor position. It's not quite clear yet, what can lead to this situation that the cursor points to an invalid position. That's why patch v9.1.0707 does not include a test case. The only observed impact has been a program crash. This issue has been addressed in with the patch v9.1.0707. All users are advised to upgrade.\n\n * #51821: Для закрытия CVE-2024-43374 необходимо обновить пакет\n\n * #52413: Конфликт: файл /usr/share/vim/ftplugin/mediawiki.vim из устанавливаемого пакета vim-plugin-mediawiki-syntax-0.0-alt5.noarch конфликтует с файлом из пакета vim-common-4:9.1.0917-alt1.noarch",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": [
{
"ID": "BDU:2024-06299",
"CVSS": "AV:L/AC:H/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-415, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2024-06299",
"Impact": "Low",
"Public": "20240801"
},
{
"ID": "BDU:2024-06478",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-415, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2024-06478",
"Impact": "Low",
"Public": "20240801"
},
{
"ID": "BDU:2024-07097",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2024-07097",
"Impact": "Low",
"Public": "20240815"
}
],
"CVEs": [
{
"ID": "CVE-2024-41957",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-41957",
"Impact": "Low",
"Public": "20240801"
},
{
"ID": "CVE-2024-41965",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-41965",
"Impact": "Low",
"Public": "20240801"
},
{
"ID": "CVE-2024-43374",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-43374",
"Impact": "None",
"Public": "20240816"
},
{
"ID": "CVE-2024-45306",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-45306",
"Impact": "Low",
"Public": "20240902"
}
],
"Bugzilla": [
{
"ID": "51821",
"Href": "https://bugzilla.altlinux.org/51821",
"Data": "Для закрытия CVE-2024-43374 необходимо обновить пакет"
},
{
"ID": "52413",
"Href": "https://bugzilla.altlinux.org/52413",
"Data": "Конфликт: файл /usr/share/vim/ftplugin/mediawiki.vim из устанавливаемого пакета vim-plugin-mediawiki-syntax-0.0-alt5.noarch конфликтует с файлом из пакета vim-common-4:9.1.0917-alt1.noarch"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202417456001",
"Comment": "rpm-build-vim is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456002",
"Comment": "vim-X11 is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456003",
"Comment": "vim-X11-gnome2 is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456004",
"Comment": "vim-X11-gtk2 is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456005",
"Comment": "vim-X11-gtk3 is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456006",
"Comment": "vim-common is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456007",
"Comment": "vim-console is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456008",
"Comment": "vim-enhanced is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456009",
"Comment": "vim-minimal is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456010",
"Comment": "vim-spell-source is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456011",
"Comment": "vimtutor is earlier than 4:9.1.0917-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417456012",
"Comment": "xxd is earlier than 4:9.1.0917-alt2"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,100 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:2001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417456001",
"Version": "1",
"Comment": "rpm-build-vim is installed",
"Name": "rpm-build-vim"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456002",
"Version": "1",
"Comment": "vim-X11 is installed",
"Name": "vim-X11"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456003",
"Version": "1",
"Comment": "vim-X11-gnome2 is installed",
"Name": "vim-X11-gnome2"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456004",
"Version": "1",
"Comment": "vim-X11-gtk2 is installed",
"Name": "vim-X11-gtk2"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456005",
"Version": "1",
"Comment": "vim-X11-gtk3 is installed",
"Name": "vim-X11-gtk3"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456006",
"Version": "1",
"Comment": "vim-common is installed",
"Name": "vim-common"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456007",
"Version": "1",
"Comment": "vim-console is installed",
"Name": "vim-console"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456008",
"Version": "1",
"Comment": "vim-enhanced is installed",
"Name": "vim-enhanced"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456009",
"Version": "1",
"Comment": "vim-minimal is installed",
"Name": "vim-minimal"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456010",
"Version": "1",
"Comment": "vim-spell-source is installed",
"Name": "vim-spell-source"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456011",
"Version": "1",
"Comment": "vimtutor is installed",
"Name": "vimtutor"
},
{
"ID": "oval:org.altlinux.errata:obj:202417456012",
"Version": "1",
"Comment": "xxd is installed",
"Name": "xxd"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:2001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417456001",
"Version": "1",
"Comment": "package EVR is earlier than 4:9.1.0917-alt2",
"Arch": {},
"EVR": {
"Text": "4:9.1.0917-alt2",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,162 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:2001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'p10' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:2001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417456001",
"Version": "1",
"Check": "all",
"Comment": "rpm-build-vim is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456002",
"Version": "1",
"Check": "all",
"Comment": "vim-X11 is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456003",
"Version": "1",
"Check": "all",
"Comment": "vim-X11-gnome2 is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456004",
"Version": "1",
"Check": "all",
"Comment": "vim-X11-gtk2 is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456005",
"Version": "1",
"Check": "all",
"Comment": "vim-X11-gtk3 is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456006",
"Version": "1",
"Check": "all",
"Comment": "vim-common is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456006"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456007",
"Version": "1",
"Check": "all",
"Comment": "vim-console is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456007"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456008",
"Version": "1",
"Check": "all",
"Comment": "vim-enhanced is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456008"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456009",
"Version": "1",
"Check": "all",
"Comment": "vim-minimal is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456009"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456010",
"Version": "1",
"Check": "all",
"Comment": "vim-spell-source is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456010"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456011",
"Version": "1",
"Check": "all",
"Comment": "vimtutor is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456011"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417456012",
"Version": "1",
"Check": "all",
"Comment": "xxd is earlier than 4:9.1.0917-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417456012"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417456001"
}
}
]
}

View File

@ -0,0 +1,119 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202417523",
"Version": "oval:org.altlinux.errata:def:202417523",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-17523: package `curl` update to version 8.11.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-17523",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-17523",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-11106",
"RefURL": "https://bdu.fstec.ru/vul/2024-11106",
"Source": "BDU"
},
{
"RefID": "CVE-2024-11053",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053",
"Source": "CVE"
}
],
"Description": "This update upgrades curl to version 8.11.1-alt1. \nSecurity Fix(es):\n\n * BDU:2024-11106: Уязвимость обработчика netrc-файлов утилиты командной строки cURL, позволяющая нарушителю получить доступ к учётным данным\n\n * CVE-2024-11053: When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": [
{
"ID": "BDU:2024-11106",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2024-11106",
"Impact": "Critical",
"Public": "20241108"
}
],
"CVEs": [
{
"ID": "CVE-2024-11053",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053",
"Impact": "None",
"Public": "20241211"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202417523001",
"Comment": "curl is earlier than 0:8.11.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417523002",
"Comment": "libcurl is earlier than 0:8.11.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417523003",
"Comment": "libcurl-devel is earlier than 0:8.11.1-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,46 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:2001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417523001",
"Version": "1",
"Comment": "curl is installed",
"Name": "curl"
},
{
"ID": "oval:org.altlinux.errata:obj:202417523002",
"Version": "1",
"Comment": "libcurl is installed",
"Name": "libcurl"
},
{
"ID": "oval:org.altlinux.errata:obj:202417523003",
"Version": "1",
"Comment": "libcurl-devel is installed",
"Name": "libcurl-devel"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:2001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417523001",
"Version": "1",
"Comment": "package EVR is earlier than 0:8.11.1-alt1",
"Arch": {},
"EVR": {
"Text": "0:8.11.1-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,54 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:2001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'p10' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:2001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417523001",
"Version": "1",
"Check": "all",
"Comment": "curl is earlier than 0:8.11.1-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417523001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417523001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417523002",
"Version": "1",
"Check": "all",
"Comment": "libcurl is earlier than 0:8.11.1-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417523002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417523001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417523003",
"Version": "1",
"Check": "all",
"Comment": "libcurl-devel is earlier than 0:8.11.1-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417523003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417523001"
}
}
]
}

View File

@ -0,0 +1,79 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202417767",
"Version": "oval:org.altlinux.errata:def:202417767",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-17767: package `accel-ppp` update to version 1.13.0-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-17767",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-17767",
"Source": "ALTPU"
}
],
"Description": "This update upgrades accel-ppp to version 1.13.0-alt2. \nSecurity Fix(es):\n\n * #52532: Зависает при запуске accel-pppd",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-12-28"
},
"Updated": {
"Date": "2024-12-28"
},
"BDUs": null,
"Bugzilla": [
{
"ID": "52532",
"Href": "https://bugzilla.altlinux.org/52532",
"Data": "Зависает при запуске accel-pppd"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202417767001",
"Comment": "accel-ppp is earlier than 0:1.13.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202417767002",
"Comment": "kernel-source-accel-ppp is earlier than 0:1.13.0-alt2"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,40 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:3001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202417767001",
"Version": "1",
"Comment": "accel-ppp is installed",
"Name": "accel-ppp"
},
{
"ID": "oval:org.altlinux.errata:obj:202417767002",
"Version": "1",
"Comment": "kernel-source-accel-ppp is installed",
"Name": "kernel-source-accel-ppp"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:3001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202417767001",
"Version": "1",
"Comment": "package EVR is earlier than 0:1.13.0-alt2",
"Arch": {},
"EVR": {
"Text": "0:1.13.0-alt2",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,42 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:3001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'p11' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:3001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:3001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202417767001",
"Version": "1",
"Check": "all",
"Comment": "accel-ppp is earlier than 0:1.13.0-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417767001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417767001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202417767002",
"Version": "1",
"Check": "all",
"Comment": "kernel-source-accel-ppp is earlier than 0:1.13.0-alt2",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202417767002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202417767001"
}
}
]
}