ALT Vulnerability

This commit is contained in:
Иван Пепеляев 2024-03-06 15:02:23 +00:00
parent 8e29d24390
commit 61be912e2b
13 changed files with 1519 additions and 1 deletions

View File

@ -0,0 +1,129 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20243160",
"Version": "oval:org.altlinux.errata:def:20243160",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-3160: package `open-vm-tools` update to version 12.3.5-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-3160",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-3160",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-07234",
"RefURL": "https://bdu.fstec.ru/vul/2023-07234",
"Source": "BDU"
},
{
"RefID": "CVE-2023-34058",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34058",
"Source": "CVE"
},
{
"RefID": "CVE-2023-34059",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-34059",
"Source": "CVE"
}
],
"Description": "This update upgrades open-vm-tools to version 12.3.5-alt1. \nSecurity Fix(es):\n\n * BDU:2023-07234: Уязвимость набора утилит VMware Tools для операционных систем Windows, связанная с недостатками процедуры авторизации, позволяющая нарушителю повысить свои привилегии\n\n * CVE-2023-34058: VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .\n\n * CVE-2023-34059: open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the \n/dev/uinput file descriptor allowing them to simulate user inputs.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-03-06"
},
"Updated": {
"Date": "2024-03-06"
},
"bdu": [
{
"Cvss": "AV:A/AC:H/Au:S/C:C/I:C/A:C",
"Cvss3": "AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-285",
"Href": "https://bdu.fstec.ru/vul/2023-07234",
"Impact": "High",
"Public": "20231026",
"CveID": "BDU:2023-07234"
}
],
"Cves": [
{
"Cvss3": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-347",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34058",
"Impact": "High",
"Public": "20231027",
"CveID": "CVE-2023-34058"
},
{
"Cvss3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-34059",
"Impact": "High",
"Public": "20231027",
"CveID": "CVE-2023-34059"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20243160001",
"Comment": "open-vm-tools is earlier than 0:12.3.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243160002",
"Comment": "open-vm-tools-desktop is earlier than 0:12.3.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243160003",
"Comment": "open-vm-tools-devel is earlier than 0:12.3.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243160004",
"Comment": "open-vm-tools-salt-minion is earlier than 0:12.3.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243160005",
"Comment": "open-vm-tools-test is earlier than 0:12.3.5-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,58 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:4001",
"Version": "1",
"comment": "Evaluate `/etc/os-release` file content",
"Path": {
"dataType": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RpmInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:20243160001",
"Version": "1",
"comment": "open-vm-tools is installed",
"Name": "open-vm-tools"
},
{
"ID": "oval:org.altlinux.errata:obj:20243160002",
"Version": "1",
"comment": "open-vm-tools-desktop is installed",
"Name": "open-vm-tools-desktop"
},
{
"ID": "oval:org.altlinux.errata:obj:20243160003",
"Version": "1",
"comment": "open-vm-tools-devel is installed",
"Name": "open-vm-tools-devel"
},
{
"ID": "oval:org.altlinux.errata:obj:20243160004",
"Version": "1",
"comment": "open-vm-tools-salt-minion is installed",
"Name": "open-vm-tools-salt-minion"
},
{
"ID": "oval:org.altlinux.errata:obj:20243160005",
"Version": "1",
"comment": "open-vm-tools-test is installed",
"Name": "open-vm-tools-test"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:4001",
"Version": "1",
"Text": {}
}
],
"RpmInfoState": [
{
"ID": "oval:org.altlinux.errata:ste:20243160001",
"Version": "1",
"Comment": "package EVR is earlier than 0:12.3.5-alt1",
"Arch": {},
"Evr": {
"Text": "0:12.3.5-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,78 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:4001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:4001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:20243160001",
"Version": "1",
"Check": "all",
"Comment": "open-vm-tools is earlier than 0:12.3.5-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243160001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243160001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243160002",
"Version": "1",
"Check": "all",
"Comment": "open-vm-tools-desktop is earlier than 0:12.3.5-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243160002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243160001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243160003",
"Version": "1",
"Check": "all",
"Comment": "open-vm-tools-devel is earlier than 0:12.3.5-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243160003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243160001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243160004",
"Version": "1",
"Check": "all",
"Comment": "open-vm-tools-salt-minion is earlier than 0:12.3.5-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243160004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243160001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243160005",
"Version": "1",
"Check": "all",
"Comment": "open-vm-tools-test is earlier than 0:12.3.5-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243160005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243160001"
}
}
]
}

View File

@ -0,0 +1,130 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20243502",
"Version": "oval:org.altlinux.errata:def:20243502",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-3502: package `golang` update to version 1.21.8-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f2"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-3502",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-3502",
"Source": "ALTPU"
},
{
"RefID": "CVE-2023-45288",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288",
"Source": "CVE"
},
{
"RefID": "CVE-2023-45289",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45289",
"Source": "CVE"
},
{
"RefID": "CVE-2023-45290",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45290",
"Source": "CVE"
},
{
"RefID": "CVE-2024-24783",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-24783",
"Source": "CVE"
}
],
"Description": "This update upgrades golang to version 1.21.8-alt1. \nSecurity Fix(es):\n\n * CVE-2023-45288: description unavailable\n\n * CVE-2023-45289: When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.\n\n * CVE-2023-45290: When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.\n\n * CVE-2024-24783: Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-03-06"
},
"Updated": {
"Date": "2024-03-06"
},
"bdu": null,
"Cves": [
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45289",
"Impact": "None",
"Public": "20240305",
"CveID": "CVE-2023-45289"
},
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45290",
"Impact": "None",
"Public": "20240305",
"CveID": "CVE-2023-45290"
},
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-24783",
"Impact": "None",
"Public": "20240305",
"CveID": "CVE-2024-24783"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20243502001",
"Comment": "golang is earlier than 0:1.21.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243502002",
"Comment": "golang-docs is earlier than 0:1.21.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243502003",
"Comment": "golang-gdb is earlier than 0:1.21.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243502004",
"Comment": "golang-misc is earlier than 0:1.21.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243502005",
"Comment": "golang-shared is earlier than 0:1.21.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243502006",
"Comment": "golang-src is earlier than 0:1.21.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243502007",
"Comment": "golang-tests is earlier than 0:1.21.8-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,70 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:5001",
"Version": "1",
"comment": "Evaluate `/etc/os-release` file content",
"Path": {
"dataType": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RpmInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:20243502001",
"Version": "1",
"comment": "golang is installed",
"Name": "golang"
},
{
"ID": "oval:org.altlinux.errata:obj:20243502002",
"Version": "1",
"comment": "golang-docs is installed",
"Name": "golang-docs"
},
{
"ID": "oval:org.altlinux.errata:obj:20243502003",
"Version": "1",
"comment": "golang-gdb is installed",
"Name": "golang-gdb"
},
{
"ID": "oval:org.altlinux.errata:obj:20243502004",
"Version": "1",
"comment": "golang-misc is installed",
"Name": "golang-misc"
},
{
"ID": "oval:org.altlinux.errata:obj:20243502005",
"Version": "1",
"comment": "golang-shared is installed",
"Name": "golang-shared"
},
{
"ID": "oval:org.altlinux.errata:obj:20243502006",
"Version": "1",
"comment": "golang-src is installed",
"Name": "golang-src"
},
{
"ID": "oval:org.altlinux.errata:obj:20243502007",
"Version": "1",
"comment": "golang-tests is installed",
"Name": "golang-tests"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:5001",
"Version": "1",
"Text": {}
}
],
"RpmInfoState": [
{
"ID": "oval:org.altlinux.errata:ste:20243502001",
"Version": "1",
"Comment": "package EVR is earlier than 0:1.21.8-alt1",
"Arch": {},
"Evr": {
"Text": "0:1.21.8-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,102 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:5001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f2' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:5001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:5001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:20243502001",
"Version": "1",
"Check": "all",
"Comment": "golang is earlier than 0:1.21.8-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243502001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243502001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243502002",
"Version": "1",
"Check": "all",
"Comment": "golang-docs is earlier than 0:1.21.8-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243502002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243502001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243502003",
"Version": "1",
"Check": "all",
"Comment": "golang-gdb is earlier than 0:1.21.8-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243502003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243502001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243502004",
"Version": "1",
"Check": "all",
"Comment": "golang-misc is earlier than 0:1.21.8-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243502004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243502001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243502005",
"Version": "1",
"Check": "all",
"Comment": "golang-shared is earlier than 0:1.21.8-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243502005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243502001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243502006",
"Version": "1",
"Check": "all",
"Comment": "golang-src is earlier than 0:1.21.8-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243502006"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243502001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243502007",
"Version": "1",
"Check": "all",
"Comment": "golang-tests is earlier than 0:1.21.8-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243502007"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243502001"
}
}
]
}

View File

@ -0,0 +1,312 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20243077",
"Version": "oval:org.altlinux.errata:def:20243077",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-3077: package `zabbix` update to version 6.0.27-alt0.p10.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-3077",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-3077",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-09066",
"RefURL": "https://bdu.fstec.ru/vul/2023-09066",
"Source": "BDU"
},
{
"RefID": "BDU:2024-00033",
"RefURL": "https://bdu.fstec.ru/vul/2024-00033",
"Source": "BDU"
},
{
"RefID": "BDU:2024-00645",
"RefURL": "https://bdu.fstec.ru/vul/2024-00645",
"Source": "BDU"
},
{
"RefID": "CVE-2023-32725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32725",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32726",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32726",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32727",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32727",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32728",
"Source": "CVE"
},
{
"RefID": "CVE-2024-22119",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-22119",
"Source": "CVE"
}
],
"Description": "This update upgrades zabbix to version 6.0.27-alt0.p10.1. \nSecurity Fix(es):\n\n * BDU:2023-09066: Уязвимость файла cookie zbx_session универсальной системы мониторинга Zabbix, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2024-00033: Уязвимость функции icmpping универсальной системы мониторинга Zabbix, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2024-00645: Уязвимость компонента DNS Response Handler агента универсальной системы мониторинга Zabbix, позволяющая нарушителю вызвать переполнение буфера\n\n * CVE-2023-32725: The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.\n\n * CVE-2023-32726: The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.\n\n * CVE-2023-32727: An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.\n\n * CVE-2023-32728: The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.\n\n * CVE-2024-22119: The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-03-06"
},
"Updated": {
"Date": "2024-03-06"
},
"bdu": [
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"Cwe": "CWE-565",
"Href": "https://bdu.fstec.ru/vul/2023-09066",
"Impact": "Critical",
"Public": "20231218",
"CveID": "BDU:2023-09066"
},
{
"Cvss": "AV:N/AC:L/Au:M/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2024-00033",
"Impact": "High",
"Public": "20231218",
"CveID": "BDU:2024-00033"
},
{
"Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-754",
"Href": "https://bdu.fstec.ru/vul/2024-00645",
"Impact": "High",
"Public": "20231218",
"CveID": "BDU:2024-00645"
}
],
"Cves": [
{
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Cwe": "CWE-565",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32725",
"Impact": "High",
"Public": "20231218",
"CveID": "CVE-2023-32725"
},
{
"Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32726",
"Impact": "High",
"Public": "20231218",
"CveID": "CVE-2023-32726"
},
{
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32727",
"Impact": "High",
"Public": "20231218",
"CveID": "CVE-2023-32727"
},
{
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32728",
"Impact": "Critical",
"Public": "20231218",
"CveID": "CVE-2023-32728"
},
{
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"Cwe": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-22119",
"Impact": "Low",
"Public": "20240209",
"CveID": "CVE-2024-22119"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20243077001",
"Comment": "zabbix-agent is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077002",
"Comment": "zabbix-agent-sudo is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077003",
"Comment": "zabbix-agent2 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077004",
"Comment": "zabbix-common is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077005",
"Comment": "zabbix-common-database-mysql is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077006",
"Comment": "zabbix-common-database-pgsql is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077007",
"Comment": "zabbix-common-database-sqlite3 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077008",
"Comment": "zabbix-contrib is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077009",
"Comment": "zabbix-doc is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077010",
"Comment": "zabbix-java-gateway is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077011",
"Comment": "zabbix-phpfrontend-apache2 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077012",
"Comment": "zabbix-phpfrontend-apache2-mod_php7 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077013",
"Comment": "zabbix-phpfrontend-apache2-mod_php8.0 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077014",
"Comment": "zabbix-phpfrontend-apache2-mod_php8.1 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077015",
"Comment": "zabbix-phpfrontend-apache2-mod_php8.2 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077016",
"Comment": "zabbix-phpfrontend-engine is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077017",
"Comment": "zabbix-phpfrontend-php7 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077018",
"Comment": "zabbix-phpfrontend-php8.0 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077019",
"Comment": "zabbix-phpfrontend-php8.1 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077020",
"Comment": "zabbix-phpfrontend-php8.2 is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077021",
"Comment": "zabbix-proxy is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077022",
"Comment": "zabbix-proxy-common is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077023",
"Comment": "zabbix-proxy-pgsql is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077024",
"Comment": "zabbix-server-common is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077025",
"Comment": "zabbix-server-mysql is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077026",
"Comment": "zabbix-server-pgsql is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077027",
"Comment": "zabbix-source is earlier than 1:6.0.27-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20243077028",
"Comment": "zabbix-web-service is earlier than 1:6.0.27-alt0.p10.1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,196 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:2001",
"Version": "1",
"comment": "Evaluate `/etc/os-release` file content",
"Path": {
"dataType": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RpmInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:20243077001",
"Version": "1",
"comment": "zabbix-agent is installed",
"Name": "zabbix-agent"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077002",
"Version": "1",
"comment": "zabbix-agent-sudo is installed",
"Name": "zabbix-agent-sudo"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077003",
"Version": "1",
"comment": "zabbix-agent2 is installed",
"Name": "zabbix-agent2"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077004",
"Version": "1",
"comment": "zabbix-common is installed",
"Name": "zabbix-common"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077005",
"Version": "1",
"comment": "zabbix-common-database-mysql is installed",
"Name": "zabbix-common-database-mysql"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077006",
"Version": "1",
"comment": "zabbix-common-database-pgsql is installed",
"Name": "zabbix-common-database-pgsql"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077007",
"Version": "1",
"comment": "zabbix-common-database-sqlite3 is installed",
"Name": "zabbix-common-database-sqlite3"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077008",
"Version": "1",
"comment": "zabbix-contrib is installed",
"Name": "zabbix-contrib"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077009",
"Version": "1",
"comment": "zabbix-doc is installed",
"Name": "zabbix-doc"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077010",
"Version": "1",
"comment": "zabbix-java-gateway is installed",
"Name": "zabbix-java-gateway"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077011",
"Version": "1",
"comment": "zabbix-phpfrontend-apache2 is installed",
"Name": "zabbix-phpfrontend-apache2"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077012",
"Version": "1",
"comment": "zabbix-phpfrontend-apache2-mod_php7 is installed",
"Name": "zabbix-phpfrontend-apache2-mod_php7"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077013",
"Version": "1",
"comment": "zabbix-phpfrontend-apache2-mod_php8.0 is installed",
"Name": "zabbix-phpfrontend-apache2-mod_php8.0"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077014",
"Version": "1",
"comment": "zabbix-phpfrontend-apache2-mod_php8.1 is installed",
"Name": "zabbix-phpfrontend-apache2-mod_php8.1"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077015",
"Version": "1",
"comment": "zabbix-phpfrontend-apache2-mod_php8.2 is installed",
"Name": "zabbix-phpfrontend-apache2-mod_php8.2"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077016",
"Version": "1",
"comment": "zabbix-phpfrontend-engine is installed",
"Name": "zabbix-phpfrontend-engine"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077017",
"Version": "1",
"comment": "zabbix-phpfrontend-php7 is installed",
"Name": "zabbix-phpfrontend-php7"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077018",
"Version": "1",
"comment": "zabbix-phpfrontend-php8.0 is installed",
"Name": "zabbix-phpfrontend-php8.0"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077019",
"Version": "1",
"comment": "zabbix-phpfrontend-php8.1 is installed",
"Name": "zabbix-phpfrontend-php8.1"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077020",
"Version": "1",
"comment": "zabbix-phpfrontend-php8.2 is installed",
"Name": "zabbix-phpfrontend-php8.2"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077021",
"Version": "1",
"comment": "zabbix-proxy is installed",
"Name": "zabbix-proxy"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077022",
"Version": "1",
"comment": "zabbix-proxy-common is installed",
"Name": "zabbix-proxy-common"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077023",
"Version": "1",
"comment": "zabbix-proxy-pgsql is installed",
"Name": "zabbix-proxy-pgsql"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077024",
"Version": "1",
"comment": "zabbix-server-common is installed",
"Name": "zabbix-server-common"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077025",
"Version": "1",
"comment": "zabbix-server-mysql is installed",
"Name": "zabbix-server-mysql"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077026",
"Version": "1",
"comment": "zabbix-server-pgsql is installed",
"Name": "zabbix-server-pgsql"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077027",
"Version": "1",
"comment": "zabbix-source is installed",
"Name": "zabbix-source"
},
{
"ID": "oval:org.altlinux.errata:obj:20243077028",
"Version": "1",
"comment": "zabbix-web-service is installed",
"Name": "zabbix-web-service"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:2001",
"Version": "1",
"Text": {}
}
],
"RpmInfoState": [
{
"ID": "oval:org.altlinux.errata:ste:20243077001",
"Version": "1",
"Comment": "package EVR is earlier than 1:6.0.27-alt0.p10.1",
"Arch": {},
"Evr": {
"Text": "1:6.0.27-alt0.p10.1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,354 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:2001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'p10' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:2001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:20243077001",
"Version": "1",
"Check": "all",
"Comment": "zabbix-agent is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077002",
"Version": "1",
"Check": "all",
"Comment": "zabbix-agent-sudo is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077003",
"Version": "1",
"Check": "all",
"Comment": "zabbix-agent2 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077004",
"Version": "1",
"Check": "all",
"Comment": "zabbix-common is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077005",
"Version": "1",
"Check": "all",
"Comment": "zabbix-common-database-mysql is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077006",
"Version": "1",
"Check": "all",
"Comment": "zabbix-common-database-pgsql is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077006"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077007",
"Version": "1",
"Check": "all",
"Comment": "zabbix-common-database-sqlite3 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077007"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077008",
"Version": "1",
"Check": "all",
"Comment": "zabbix-contrib is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077008"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077009",
"Version": "1",
"Check": "all",
"Comment": "zabbix-doc is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077009"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077010",
"Version": "1",
"Check": "all",
"Comment": "zabbix-java-gateway is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077010"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077011",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-apache2 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077011"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077012",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-apache2-mod_php7 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077012"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077013",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-apache2-mod_php8.0 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077013"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077014",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-apache2-mod_php8.1 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077014"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077015",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-apache2-mod_php8.2 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077015"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077016",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-engine is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077016"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077017",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-php7 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077017"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077018",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-php8.0 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077018"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077019",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-php8.1 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077019"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077020",
"Version": "1",
"Check": "all",
"Comment": "zabbix-phpfrontend-php8.2 is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077020"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077021",
"Version": "1",
"Check": "all",
"Comment": "zabbix-proxy is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077021"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077022",
"Version": "1",
"Check": "all",
"Comment": "zabbix-proxy-common is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077022"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077023",
"Version": "1",
"Check": "all",
"Comment": "zabbix-proxy-pgsql is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077023"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077024",
"Version": "1",
"Check": "all",
"Comment": "zabbix-server-common is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077024"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077025",
"Version": "1",
"Check": "all",
"Comment": "zabbix-server-mysql is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077025"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077026",
"Version": "1",
"Check": "all",
"Comment": "zabbix-server-pgsql is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077026"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077027",
"Version": "1",
"Check": "all",
"Comment": "zabbix-source is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077027"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:20243077028",
"Version": "1",
"Check": "all",
"Comment": "zabbix-web-service is earlier than 1:6.0.27-alt0.p10.1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:20243077028"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:20243077001"
}
}
]
}

View File

@ -50,7 +50,7 @@
"Source": "CVE"
}
],
"Description": "This update upgrades golang to version 1.21.8-alt1. \nSecurity Fix(es):\n\n * CVE-2023-45288: description unavailable\n\n * CVE-2023-45289: description unavailable\n\n * CVE-2023-45290: description unavailable\n\n * CVE-2024-24783: description unavailable",
"Description": "This update upgrades golang to version 1.21.8-alt1. \nSecurity Fix(es):\n\n * CVE-2023-45288: description unavailable\n\n * CVE-2023-45289: When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.\n\n * CVE-2023-45290: When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.\n\n * CVE-2024-24783: Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
@ -62,6 +62,26 @@
"Date": "2024-03-06"
},
"bdu": null,
"Cves": [
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45289",
"Impact": "None",
"Public": "20240305",
"CveID": "CVE-2023-45289"
},
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45290",
"Impact": "None",
"Public": "20240305",
"CveID": "CVE-2023-45290"
},
{
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-24783",
"Impact": "None",
"Public": "20240305",
"CveID": "CVE-2024-24783"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:kworkstation:10",