diff --git a/oval/c10f2/ALT-PU-2024-1154/definitions.json b/oval/c10f2/ALT-PU-2024-1154/definitions.json new file mode 100644 index 0000000000..5cf0237788 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1154/definitions.json @@ -0,0 +1,105 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241154", + "Version": "oval:org.altlinux.errata:def:20241154", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1154: package `mate-document-viewer` update to version 1.26.1-alt2", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1154", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1154", + "Source": "ALTPU" + } + ], + "Description": "This update upgrades mate-document-viewer to version 1.26.1-alt2. \nSecurity Fix(es):\n\n * #48498: mate-document-viewer-thumbnailer тянет лишние зависимости", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Low", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": null, + "Bugzilla": [ + { + "Id": "48498", + "Href": "https://bugzilla.altlinux.org/48498", + "Data": "mate-document-viewer-thumbnailer тянет лишние зависимости" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241154001", + "Comment": "libmate-document-viewer is earlier than 1:1.26.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241154002", + "Comment": "mate-document-viewer is earlier than 1:1.26.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241154003", + "Comment": "mate-document-viewer-caja is earlier than 1:1.26.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241154004", + "Comment": "mate-document-viewer-devel is earlier than 1:1.26.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241154005", + "Comment": "mate-document-viewer-djvu is earlier than 1:1.26.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241154006", + "Comment": "mate-document-viewer-dvi is earlier than 1:1.26.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241154007", + "Comment": "mate-document-viewer-pixbuf is earlier than 1:1.26.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241154008", + "Comment": "mate-document-viewer-thumbnailer is earlier than 1:1.26.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241154009", + "Comment": "mate-document-viewer-xps is earlier than 1:1.26.1-alt2" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1154/objects.json b/oval/c10f2/ALT-PU-2024-1154/objects.json new file mode 100644 index 0000000000..cc7be13ef2 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1154/objects.json @@ -0,0 +1,82 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241154001", + "Version": "1", + "comment": "libmate-document-viewer is installed", + "Name": "libmate-document-viewer" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241154002", + "Version": "1", + "comment": "mate-document-viewer is installed", + "Name": "mate-document-viewer" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241154003", + "Version": "1", + "comment": "mate-document-viewer-caja is installed", + "Name": "mate-document-viewer-caja" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241154004", + "Version": "1", + "comment": "mate-document-viewer-devel is installed", + "Name": "mate-document-viewer-devel" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241154005", + "Version": "1", + "comment": "mate-document-viewer-djvu is installed", + "Name": "mate-document-viewer-djvu" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241154006", + "Version": "1", + "comment": "mate-document-viewer-dvi is installed", + "Name": "mate-document-viewer-dvi" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241154007", + "Version": "1", + "comment": "mate-document-viewer-pixbuf is installed", + "Name": "mate-document-viewer-pixbuf" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241154008", + "Version": "1", + "comment": "mate-document-viewer-thumbnailer is installed", + "Name": "mate-document-viewer-thumbnailer" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241154009", + "Version": "1", + "comment": "mate-document-viewer-xps is installed", + "Name": "mate-document-viewer-xps" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1154/states.json b/oval/c10f2/ALT-PU-2024-1154/states.json new file mode 100644 index 0000000000..ea3994b2a8 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1154/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241154001", + "Version": "1", + "Comment": "package EVR is earlier than 1:1.26.1-alt2", + "Arch": {}, + "Evr": { + "Text": "1:1.26.1-alt2", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1154/tests.json b/oval/c10f2/ALT-PU-2024-1154/tests.json new file mode 100644 index 0000000000..1d952c8a6e --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1154/tests.json @@ -0,0 +1,126 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241154001", + "Version": "1", + "Check": "all", + "Comment": "libmate-document-viewer is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241154002", + "Version": "1", + "Check": "all", + "Comment": "mate-document-viewer is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241154003", + "Version": "1", + "Check": "all", + "Comment": "mate-document-viewer-caja is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241154004", + "Version": "1", + "Check": "all", + "Comment": "mate-document-viewer-devel is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154004" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241154005", + "Version": "1", + "Check": "all", + "Comment": "mate-document-viewer-djvu is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154005" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241154006", + "Version": "1", + "Check": "all", + "Comment": "mate-document-viewer-dvi is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154006" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241154007", + "Version": "1", + "Check": "all", + "Comment": "mate-document-viewer-pixbuf is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154007" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241154008", + "Version": "1", + "Check": "all", + "Comment": "mate-document-viewer-thumbnailer is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154008" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241154009", + "Version": "1", + "Check": "all", + "Comment": "mate-document-viewer-xps is earlier than 1:1.26.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241154009" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241154001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1155/definitions.json b/oval/c10f2/ALT-PU-2024-1155/definitions.json new file mode 100644 index 0000000000..2935887ab5 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1155/definitions.json @@ -0,0 +1,77 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241155", + "Version": "oval:org.altlinux.errata:def:20241155", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1155: package `mate-screensaver` update to version 1.26.2-alt1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1155", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1155", + "Source": "ALTPU" + } + ], + "Description": "This update upgrades mate-screensaver to version 1.26.2-alt1. \nSecurity Fix(es):\n\n * #45817: В MATE alt-customize-branding не изменяет оформление экрана блокировки", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Low", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": null, + "Bugzilla": [ + { + "Id": "45817", + "Href": "https://bugzilla.altlinux.org/45817", + "Data": "В MATE alt-customize-branding не изменяет оформление экрана блокировки" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241155001", + "Comment": "mate-screensaver is earlier than 2:1.26.2-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241155002", + "Comment": "mate-screensaver-devel is earlier than 2:1.26.2-alt1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1155/objects.json b/oval/c10f2/ALT-PU-2024-1155/objects.json new file mode 100644 index 0000000000..e3e7b0a1aa --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1155/objects.json @@ -0,0 +1,40 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241155001", + "Version": "1", + "comment": "mate-screensaver is installed", + "Name": "mate-screensaver" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241155002", + "Version": "1", + "comment": "mate-screensaver-devel is installed", + "Name": "mate-screensaver-devel" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1155/states.json b/oval/c10f2/ALT-PU-2024-1155/states.json new file mode 100644 index 0000000000..9767585ae7 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1155/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241155001", + "Version": "1", + "Comment": "package EVR is earlier than 2:1.26.2-alt1", + "Arch": {}, + "Evr": { + "Text": "2:1.26.2-alt1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1155/tests.json b/oval/c10f2/ALT-PU-2024-1155/tests.json new file mode 100644 index 0000000000..e62f0de14c --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1155/tests.json @@ -0,0 +1,42 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241155001", + "Version": "1", + "Check": "all", + "Comment": "mate-screensaver is earlier than 2:1.26.2-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241155001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241155001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241155002", + "Version": "1", + "Check": "all", + "Comment": "mate-screensaver-devel is earlier than 2:1.26.2-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241155002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241155001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1191/definitions.json b/oval/c10f2/ALT-PU-2024-1191/definitions.json new file mode 100644 index 0000000000..cab4a5c070 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1191/definitions.json @@ -0,0 +1,228 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241191", + "Version": "oval:org.altlinux.errata:def:20241191", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1191: package `zabbix` update to version 6.0.25-alt2", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1191", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1191", + "Source": "ALTPU" + }, + { + "RefID": "BDU:2023-06803", + "RefURL": "https://bdu.fstec.ru/vul/2023-06803", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-08246", + "RefURL": "https://bdu.fstec.ru/vul/2023-08246", + "Source": "BDU" + }, + { + "RefID": "CVE-2023-32721", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32721", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32722", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32722", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32724", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32724", + "Source": "CVE" + } + ], + "Description": "This update upgrades zabbix to version 6.0.25-alt2. \nSecurity Fix(es):\n\n * BDU:2023-06803: Уязвимость интерфейса универсальной системы мониторинга Zabbix, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2023-08246: Уязвимость модуля zabbix/src/libs/zbxjson универсальной системы мониторинга Zabbix, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2023-32721: A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.\n\n * CVE-2023-32722: The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.\n\n * CVE-2023-32724: Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Critical", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": [ + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:C/A:N", + "Cvss3": "AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N", + "Cwe": "CWE-20, CWE-79", + "Href": "https://bdu.fstec.ru/vul/2023-06803", + "Impact": "High", + "Public": "20230511", + "CveID": "BDU:2023-06803" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "Cwe": "CWE-120, CWE-787", + "Href": "https://bdu.fstec.ru/vul/2023-08246", + "Impact": "Critical", + "Public": "20230911", + "CveID": "BDU:2023-08246" + } + ], + "Cves": [ + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32721", + "Impact": "Low", + "Public": "20231012", + "CveID": "CVE-2023-32721" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-787", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32722", + "Impact": "High", + "Public": "20231012", + "CveID": "CVE-2023-32722" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-732", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32724", + "Impact": "High", + "Public": "20231012", + "CveID": "CVE-2023-32724" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241191001", + "Comment": "zabbix-agent is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191002", + "Comment": "zabbix-agent-sudo is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191003", + "Comment": "zabbix-agent2 is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191004", + "Comment": "zabbix-common is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191005", + "Comment": "zabbix-common-database-mysql is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191006", + "Comment": "zabbix-common-database-pgsql is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191007", + "Comment": "zabbix-common-database-sqlite3 is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191008", + "Comment": "zabbix-contrib is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191009", + "Comment": "zabbix-doc is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191010", + "Comment": "zabbix-java-gateway is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191011", + "Comment": "zabbix-phpfrontend-apache2 is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191012", + "Comment": "zabbix-phpfrontend-apache2-mod_php8.1 is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191013", + "Comment": "zabbix-phpfrontend-apache2-mod_php8.2 is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191014", + "Comment": "zabbix-phpfrontend-engine is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191015", + "Comment": "zabbix-phpfrontend-php8.1 is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191016", + "Comment": "zabbix-phpfrontend-php8.2 is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191017", + "Comment": "zabbix-proxy is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191018", + "Comment": "zabbix-proxy-common is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191019", + "Comment": "zabbix-proxy-pgsql is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191020", + "Comment": "zabbix-server-common is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191021", + "Comment": "zabbix-server-mysql is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191022", + "Comment": "zabbix-server-pgsql is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191023", + "Comment": "zabbix-source is earlier than 1:6.0.25-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241191024", + "Comment": "zabbix-web-service is earlier than 1:6.0.25-alt2" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1191/objects.json b/oval/c10f2/ALT-PU-2024-1191/objects.json new file mode 100644 index 0000000000..fcec5b654b --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1191/objects.json @@ -0,0 +1,172 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241191001", + "Version": "1", + "comment": "zabbix-agent is installed", + "Name": "zabbix-agent" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191002", + "Version": "1", + "comment": "zabbix-agent-sudo is installed", + "Name": "zabbix-agent-sudo" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191003", + "Version": "1", + "comment": "zabbix-agent2 is installed", + "Name": "zabbix-agent2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191004", + "Version": "1", + "comment": "zabbix-common is installed", + "Name": "zabbix-common" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191005", + "Version": "1", + "comment": "zabbix-common-database-mysql is installed", + "Name": "zabbix-common-database-mysql" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191006", + "Version": "1", + "comment": "zabbix-common-database-pgsql is installed", + "Name": "zabbix-common-database-pgsql" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191007", + "Version": "1", + "comment": "zabbix-common-database-sqlite3 is installed", + "Name": "zabbix-common-database-sqlite3" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191008", + "Version": "1", + "comment": "zabbix-contrib is installed", + "Name": "zabbix-contrib" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191009", + "Version": "1", + "comment": "zabbix-doc is installed", + "Name": "zabbix-doc" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191010", + "Version": "1", + "comment": "zabbix-java-gateway is installed", + "Name": "zabbix-java-gateway" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191011", + "Version": "1", + "comment": "zabbix-phpfrontend-apache2 is installed", + "Name": "zabbix-phpfrontend-apache2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191012", + "Version": "1", + "comment": "zabbix-phpfrontend-apache2-mod_php8.1 is installed", + "Name": "zabbix-phpfrontend-apache2-mod_php8.1" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191013", + "Version": "1", + "comment": "zabbix-phpfrontend-apache2-mod_php8.2 is installed", + "Name": "zabbix-phpfrontend-apache2-mod_php8.2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191014", + "Version": "1", + "comment": "zabbix-phpfrontend-engine is installed", + "Name": "zabbix-phpfrontend-engine" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191015", + "Version": "1", + "comment": "zabbix-phpfrontend-php8.1 is installed", + "Name": "zabbix-phpfrontend-php8.1" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191016", + "Version": "1", + "comment": "zabbix-phpfrontend-php8.2 is installed", + "Name": "zabbix-phpfrontend-php8.2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191017", + "Version": "1", + "comment": "zabbix-proxy is installed", + "Name": "zabbix-proxy" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191018", + "Version": "1", + "comment": "zabbix-proxy-common is installed", + "Name": "zabbix-proxy-common" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191019", + "Version": "1", + "comment": "zabbix-proxy-pgsql is installed", + "Name": "zabbix-proxy-pgsql" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191020", + "Version": "1", + "comment": "zabbix-server-common is installed", + "Name": "zabbix-server-common" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191021", + "Version": "1", + "comment": "zabbix-server-mysql is installed", + "Name": "zabbix-server-mysql" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191022", + "Version": "1", + "comment": "zabbix-server-pgsql is installed", + "Name": "zabbix-server-pgsql" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191023", + "Version": "1", + "comment": "zabbix-source is installed", + "Name": "zabbix-source" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241191024", + "Version": "1", + "comment": "zabbix-web-service is installed", + "Name": "zabbix-web-service" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1191/states.json b/oval/c10f2/ALT-PU-2024-1191/states.json new file mode 100644 index 0000000000..1a6b68e567 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1191/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241191001", + "Version": "1", + "Comment": "package EVR is earlier than 1:6.0.25-alt2", + "Arch": {}, + "Evr": { + "Text": "1:6.0.25-alt2", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1191/tests.json b/oval/c10f2/ALT-PU-2024-1191/tests.json new file mode 100644 index 0000000000..7451c45f87 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1191/tests.json @@ -0,0 +1,306 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241191001", + "Version": "1", + "Check": "all", + "Comment": "zabbix-agent is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191002", + "Version": "1", + "Check": "all", + "Comment": "zabbix-agent-sudo is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191003", + "Version": "1", + "Check": "all", + "Comment": "zabbix-agent2 is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191004", + "Version": "1", + "Check": "all", + "Comment": "zabbix-common is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191004" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191005", + "Version": "1", + "Check": "all", + "Comment": "zabbix-common-database-mysql is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191005" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191006", + "Version": "1", + "Check": "all", + "Comment": "zabbix-common-database-pgsql is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191006" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191007", + "Version": "1", + "Check": "all", + "Comment": "zabbix-common-database-sqlite3 is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191007" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191008", + "Version": "1", + "Check": "all", + "Comment": "zabbix-contrib is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191008" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191009", + "Version": "1", + "Check": "all", + "Comment": "zabbix-doc is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191009" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191010", + "Version": "1", + "Check": "all", + "Comment": "zabbix-java-gateway is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191010" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191011", + "Version": "1", + "Check": "all", + "Comment": "zabbix-phpfrontend-apache2 is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191011" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191012", + "Version": "1", + "Check": "all", + "Comment": "zabbix-phpfrontend-apache2-mod_php8.1 is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191012" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191013", + "Version": "1", + "Check": "all", + "Comment": "zabbix-phpfrontend-apache2-mod_php8.2 is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191013" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191014", + "Version": "1", + "Check": "all", + "Comment": "zabbix-phpfrontend-engine is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191014" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191015", + "Version": "1", + "Check": "all", + "Comment": "zabbix-phpfrontend-php8.1 is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191015" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191016", + "Version": "1", + "Check": "all", + "Comment": "zabbix-phpfrontend-php8.2 is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191016" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191017", + "Version": "1", + "Check": "all", + "Comment": "zabbix-proxy is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191017" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191018", + "Version": "1", + "Check": "all", + "Comment": "zabbix-proxy-common is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191018" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191019", + "Version": "1", + "Check": "all", + "Comment": "zabbix-proxy-pgsql is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191019" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191020", + "Version": "1", + "Check": "all", + "Comment": "zabbix-server-common is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191020" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191021", + "Version": "1", + "Check": "all", + "Comment": "zabbix-server-mysql is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191021" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191022", + "Version": "1", + "Check": "all", + "Comment": "zabbix-server-pgsql is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191022" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191023", + "Version": "1", + "Check": "all", + "Comment": "zabbix-source is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191023" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241191024", + "Version": "1", + "Check": "all", + "Comment": "zabbix-web-service is earlier than 1:6.0.25-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241191024" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241191001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1192/definitions.json b/oval/c10f2/ALT-PU-2024-1192/definitions.json new file mode 100644 index 0000000000..2b118b77fb --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1192/definitions.json @@ -0,0 +1,816 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241192", + "Version": "oval:org.altlinux.errata:def:20241192", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1192: package `mediawiki` update to version 1.40.1-alt2", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1192", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1192", + "Source": "ALTPU" + }, + { + "RefID": "BDU:2022-03040", + "RefURL": "https://bdu.fstec.ru/vul/2022-03040", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07040", + "RefURL": "https://bdu.fstec.ru/vul/2023-07040", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07505", + "RefURL": "https://bdu.fstec.ru/vul/2023-07505", + "Source": "BDU" + }, + { + "RefID": "CVE-2022-27776", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-27776", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-28323", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-28323", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-29903", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29903", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-29904", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29904", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-29905", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29905", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-29906", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29906", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-29907", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29907", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-34750", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34750", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-34911", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34911", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-34912", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34912", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-39194", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39194", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-41765", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41765", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-41766", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41766", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-41767", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41767", + "Source": "CVE" + }, + { + "RefID": "CVE-2022-47927", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47927", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-22909", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22909", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-22910", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22910", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-22911", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22911", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-22912", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22912", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-22945", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-22945", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29137", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29137", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29139", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29139", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29140", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29140", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29141", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29141", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-29197", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-29197", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-3550", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3550", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-36674", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-36674", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-36675", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-36675", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37251", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37251", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37254", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37254", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37255", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37255", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37256", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37256", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37300", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37300", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37301", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37301", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37302", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37302", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37303", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37303", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37304", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37304", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-37305", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-37305", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45359", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45359", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45360", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45360", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45361", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45361", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45362", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45362", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45363", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45363", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45364", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45364", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45367", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45367", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45369", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45369", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45370", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45370", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45371", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45371", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45372", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45372", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45373", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45373", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45374", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45374", + "Source": "CVE" + } + ], + "Description": "This update upgrades mediawiki to version 1.40.1-alt2. \nSecurity Fix(es):\n\n * BDU:2022-03040: Уязвимость утилиты командной строки cURL, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-07040: Уязвимость файла includes/page/Article.php программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-07505: Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)\n\n * CVE-2022-27776: A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.\n\n * CVE-2022-28323: An issue was discovered in MediaWiki through 1.37.2. The SecurePoll extension allows a leak because sorting by timestamp is supported,\n\n * CVE-2022-29903: The Private Domains extension for MediaWiki through 1.37.2 (before 1ad65d4c1c199b375ea80988d99ab51ae068f766) allows CSRF for editing pages that store the extension's configuration. The attacker must trigger a POST request to Special:PrivateDomains.\n\n * CVE-2022-29904: The SemanticDrilldown extension for MediaWiki through 1.37.2 (before e688bdba6434591b5dff689a45e4d53459954773) allows SQL injection with certain '-' and '_' constraints.\n\n * CVE-2022-29905: The FanBoxes extension for MediaWiki through 1.37.2 (before 027ffb0b9d6fe0d823810cf03f5b562a212162d4) allows Special:UserBoxes CSRF.\n\n * CVE-2022-29906: The admin API module in the QuizGame extension for MediaWiki through 1.37.2 (before 665e33a68f6fa1167df99c0aa18ed0157cdf9f66) omits a check for the quizadmin user.\n\n * CVE-2022-29907: The Nimbus skin for MediaWiki through 1.37.2 (before 6f9c8fb868345701d9544a54d9752515aace39df) allows XSS in Advertise link messages.\n\n * CVE-2022-34750: An issue was discovered in MediaWiki through 1.38.1. The lemma length of a Wikibase lexeme is currently capped at a thousand characters. Unfortunately, this length is not validated, allowing much larger lexemes to be created, which introduces various denial-of-service attack vectors within the Wikibase and WikibaseLexeme extensions. This is related to Special:NewLexeme and Special:NewProperty.\n\n * CVE-2022-34911: An issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1.37.x before 1.37.3, and 1.38.x before 1.38.1. XSS can occur in configurations that allow a JavaScript payload in a username. After account creation, when it sets the page title to \"Welcome\" followed by the username, the username is not escaped: SpecialCreateAccount::successfulAction() calls ::showSuccessPage() with a message as second parameter, and OutputPage::setPageTitle() uses text().\n\n * CVE-2022-34912: An issue was discovered in MediaWiki before 1.37.3 and 1.38.x before 1.38.1. The contributions-title, used on Special:Contributions, is used as page title without escaping. Hence, in a non-default configuration where a username contains HTML entities, it won't be escaped.\n\n * CVE-2022-39194: An issue was discovered in the MediaWiki through 1.38.2. The community configuration pages for the GrowthExperiments extension could cause a site to become unavailable due to insufficient validation when certain actions (including page moves) were performed.\n\n * CVE-2022-41765: An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. HTMLUserTextField exposes the existence of hidden users.\n\n * CVE-2022-41766: An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. Upon an action=rollback operation, the alreadyrolled message can leak a user name (when the user has been revision deleted/suppressed).\n\n * CVE-2022-41767: An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. When changes made by an IP address are reassigned to a user (using reassignEdits.php), the changes will still be attributed to the IP address on Special:Contributions when doing a range lookup.\n\n * CVE-2022-47927: An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. When installing with a pre-existing data directory that has weak permissions, the SQLite files are created with file mode 0644, i.e., world readable to local users. These files include credentials data.\n\n * CVE-2023-22909: An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow.\n\n * CVE-2023-22910: An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. There is XSS in Wikibase date formatting via wikibase-time-precision-* fields. This allows JavaScript execution by staff/admin users who do not intentionally have the editsitejs capability.\n\n * CVE-2023-22911: An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. E-Widgets does widget replacement in HTML attributes, which can lead to XSS, because widget authors often do not expect that their widget is executed in an HTML attribute context.\n\n * CVE-2023-22912: An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. CheckUser TokenManager insecurely uses AES-CTR encryption with a repeated (aka re-used) nonce, allowing an adversary to decrypt.\n\n * CVE-2023-22945: In the GrowthExperiments extension for MediaWiki through 1.39, the growthmanagementorlist API allows blocked users (blocked in ApiManageMentorList) to enroll as mentors or edit any of their mentorship-related properties.\n\n * CVE-2023-29137: An issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. The UserImpactHandler for GrowthExperiments inadvertently returns the timezone preference for arbitrary users, which can be used to de-anonymize users.\n\n * CVE-2023-29139: An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. When a user with checkuserlog permissions makes many CheckUserLog API requests in some configurations, denial of service can occur (RequestTimeoutException or upstream request timeout).\n\n * CVE-2023-29140: An issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. Attackers might be able to see edits for which the username has been hidden, because there is no check for rev_deleted.\n\n * CVE-2023-29141: An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.\n\n * CVE-2023-29197: guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\\n) into both the header names and values. While the specification states that \\r\\n\\r\\n is used to terminate the header list, many servers in the wild will also accept \\n\\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.\n\n * CVE-2023-3550: Mediawiki v1.40.0 does not validate namespaces used in XML files.\n\nTherefore, if the instance administrator allows XML file uploads,\n\na remote attacker with a low-privileged user account can use this\n\nexploit to become an administrator by sending a malicious link to\n\nthe instance administrator.\n\n\n\n\n\n * CVE-2023-36674: An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, 1.39.x before 1.39.4, and 1.40.x before 1.40.1. It is possible to bypass the Bad image list (aka badFile) by using the thumb parameter (aka Manualthumb) of the File syntax.\n\n * CVE-2023-36675: An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, and 1.39.x before 1.39.4. BlockLogFormatter.php in BlockLogFormatter allows XSS in the partial blocks feature.\n\n * CVE-2023-37251: An issue was discovered in the GoogleAnalyticsMetrics extension for MediaWiki through 1.39.3. The googleanalyticstrackurl parser function does not properly escape JavaScript in the onclick handler and does not prevent use of javascript: URLs.\n\n * CVE-2023-37254: An issue was discovered in the Cargo extension for MediaWiki through 1.39.3. XSS can occur in Special:CargoQuery via a crafted page item when using the default format.\n\n * CVE-2023-37255: An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. In Special:CheckUser, a check of the \"get edits\" type is vulnerable to HTML injection through the User-Agent HTTP request header.\n\n * CVE-2023-37256: An issue was discovered in the Cargo extension for MediaWiki through 1.39.3. It allows one to store javascript: URLs in URL fields, and automatically links these URLs.\n\n * CVE-2023-37300: An issue was discovered in the CheckUserLog API in the CheckUser extension for MediaWiki through 1.39.3. There is incorrect access control for visibility of hidden users.\n\n * CVE-2023-37301: An issue was discovered in SubmitEntityAction in Wikibase in MediaWiki through 1.39.3. Because it doesn't use EditEntity for undo and restore, the intended interaction with AbuseFilter does not occur.\n\n * CVE-2023-37302: An issue was discovered in SiteLinksView.php in Wikibase in MediaWiki through 1.39.3. There is XSS via a crafted badge title attribute. This is also related to lack of escaping in wbTemplate (from resources/wikibase/templates.js) for quotes (which can be in a title attribute).\n\n * CVE-2023-37303: An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. In certain situations, an attempt to block a user fails after a temporary browser hang and a DBQueryDisconnectedError error message.\n\n * CVE-2023-37304: An issue was discovered in the DoubleWiki extension for MediaWiki through 1.39.3. includes/DoubleWiki.php allows XSS via the column alignment feature.\n\n * CVE-2023-37305: An issue was discovered in the ProofreadPage (aka Proofread Page) extension for MediaWiki through 1.39.3. In includes/Page/PageContentHandler.php and includes/Page/PageDisplayHandler.php, hidden users can be exposed via public interfaces.\n\n * CVE-2023-45359: description unavailable\n\n * CVE-2023-45360: An issue was discovered in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is XSS in youhavenewmessagesmanyusers and youhavenewmessages i18n messages. This is related to MediaWiki:Youhavenewmessagesfromusers.\n\n * CVE-2023-45361: description unavailable\n\n * CVE-2023-45362: An issue was discovered in DifferenceEngine.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. diff-multi-sameuser (aka \"X intermediate revisions by the same user not shown\") ignores username suppression. This is an information leak.\n\n * CVE-2023-45363: An issue was discovered in ApiPageSet.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It allows attackers to cause a denial of service (unbounded loop and RequestTimeoutException) when querying pages redirected to other variants with redirects and converttitles set.\n\n * CVE-2023-45364: An issue was discovered in includes/page/Article.php in MediaWiki 1.36.x through 1.39.x before 1.39.5 and 1.40.x before 1.40.1. Deleted revision existence is leaked due to incorrect permissions being checked. This reveals that a given revision ID belonged to the given page title, and its timestamp, both of which are not supposed to be public information.\n\n * CVE-2023-45367: An issue was discovered in the CheckUser extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. A user can use a rest.php/checkuser/v0/useragent-clienthints/revision/ URL to store an arbitrary number of rows in cu_useragent_clienthints, leading to a denial of service.\n\n * CVE-2023-45369: An issue was discovered in the PageTriage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. Usernames of hidden users are exposed.\n\n * CVE-2023-45370: An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. SportsTeams: Special:SportsManagerLogo and Special:SportsTeamsManagerLogo do not check for the sportsteamsmanager user right, and thus an attacker may be able to affect pages that are concerned with sports teams.\n\n * CVE-2023-45371: An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is no rate limit for merging items.\n\n * CVE-2023-45372: An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. During item merging, ItemMergeInteractor does not have an edit filter running (e.g., AbuseFilter).\n\n * CVE-2023-45373: An issue was discovered in the ProofreadPage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. XSS can occur via formatNumNoSeparators.\n\n * CVE-2023-45374: An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It does not check for the anti-CSRF edit token in Special:SportsTeamsManager and Special:UpdateFavoriteTeams.\n\n * #44708: Непрописанный файловый конфликт между mediawiki-common и mediawiki-extensions-Math\n\n * #48033: Прошу собрать с PHP 8.2", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Critical", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": [ + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-200, CWE-522", + "Href": "https://bdu.fstec.ru/vul/2022-03040", + "Impact": "Low", + "Public": "20220421", + "CveID": "BDU:2022-03040" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-732", + "Href": "https://bdu.fstec.ru/vul/2023-07040", + "Impact": "Low", + "Public": "20231006", + "CveID": "BDU:2023-07040" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "Cwe": "CWE-79", + "Href": "https://bdu.fstec.ru/vul/2023-07505", + "Impact": "Critical", + "Public": "20231010", + "CveID": "BDU:2023-07505" + } + ], + "Cves": [ + { + "Cvss": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "Cwe": "CWE-522", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-27776", + "Impact": "Low", + "Public": "20220602", + "CveID": "CVE-2022-27776" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-28323", + "Impact": "High", + "Public": "20220430", + "CveID": "CVE-2022-28323" + }, + { + "Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-352", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29903", + "Impact": "Low", + "Public": "20220429", + "CveID": "CVE-2022-29903" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-89", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29904", + "Impact": "Critical", + "Public": "20220429", + "CveID": "CVE-2022-29904" + }, + { + "Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "Cwe": "CWE-352", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29905", + "Impact": "Low", + "Public": "20220429", + "CveID": "CVE-2022-29905" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-862", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29906", + "Impact": "Critical", + "Public": "20220429", + "CveID": "CVE-2022-29906" + }, + { + "Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29907", + "Impact": "Low", + "Public": "20220429", + "CveID": "CVE-2022-29907" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-770", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34750", + "Impact": "High", + "Public": "20220628", + "CveID": "CVE-2022-34750" + }, + { + "Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34911", + "Impact": "Low", + "Public": "20220702", + "CveID": "CVE-2022-34911" + }, + { + "Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34912", + "Impact": "Low", + "Public": "20220702", + "CveID": "CVE-2022-34912" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-400", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39194", + "Impact": "Low", + "Public": "20220902", + "CveID": "CVE-2022-39194" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-203", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41765", + "Impact": "Low", + "Public": "20221226", + "CveID": "CVE-2022-41765" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-732", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41766", + "Impact": "Low", + "Public": "20230529", + "CveID": "CVE-2022-41766" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41767", + "Impact": "Low", + "Public": "20221226", + "CveID": "CVE-2022-41767" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-732", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47927", + "Impact": "Low", + "Public": "20230112", + "CveID": "CVE-2022-47927" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22909", + "Impact": "Low", + "Public": "20230110", + "CveID": "CVE-2023-22909" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22910", + "Impact": "Low", + "Public": "20230120", + "CveID": "CVE-2023-22910" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22911", + "Impact": "Low", + "Public": "20230110", + "CveID": "CVE-2023-22911" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-330", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22912", + "Impact": "Low", + "Public": "20230120", + "CveID": "CVE-2023-22912" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "Cwe": "CWE-863", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-22945", + "Impact": "Low", + "Public": "20230111", + "CveID": "CVE-2023-22945" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29137", + "Impact": "Low", + "Public": "20230331", + "CveID": "CVE-2023-29137" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29139", + "Impact": "Low", + "Public": "20230331", + "CveID": "CVE-2023-29139" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29140", + "Impact": "Low", + "Public": "20230331", + "CveID": "CVE-2023-29140" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29141", + "Impact": "Critical", + "Public": "20230331", + "CveID": "CVE-2023-29141" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "Cwe": "CWE-436", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-29197", + "Impact": "High", + "Public": "20230417", + "CveID": "CVE-2023-29197" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3550", + "Impact": "High", + "Public": "20230925", + "CveID": "CVE-2023-3550" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-36674", + "Impact": "Low", + "Public": "20230820", + "CveID": "CVE-2023-36674" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-36675", + "Impact": "Low", + "Public": "20230626", + "CveID": "CVE-2023-36675" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37251", + "Impact": "Low", + "Public": "20230629", + "CveID": "CVE-2023-37251" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37254", + "Impact": "Low", + "Public": "20230629", + "CveID": "CVE-2023-37254" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37255", + "Impact": "Low", + "Public": "20230629", + "CveID": "CVE-2023-37255" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37256", + "Impact": "Low", + "Public": "20230629", + "CveID": "CVE-2023-37256" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-Other", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37300", + "Impact": "Low", + "Public": "20230630", + "CveID": "CVE-2023-37300" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37301", + "Impact": "Low", + "Public": "20230630", + "CveID": "CVE-2023-37301" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37302", + "Impact": "Low", + "Public": "20230630", + "CveID": "CVE-2023-37302" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37303", + "Impact": "Critical", + "Public": "20230630", + "CveID": "CVE-2023-37303" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37304", + "Impact": "Low", + "Public": "20230630", + "CveID": "CVE-2023-37304" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-37305", + "Impact": "Low", + "Public": "20230630", + "CveID": "CVE-2023-37305" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45360", + "Impact": "Low", + "Public": "20231103", + "CveID": "CVE-2023-45360" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45362", + "Impact": "Low", + "Public": "20231103", + "CveID": "CVE-2023-45362" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-835", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45363", + "Impact": "High", + "Public": "20231009", + "CveID": "CVE-2023-45363" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-732", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45364", + "Impact": "Low", + "Public": "20231009", + "CveID": "CVE-2023-45364" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45367", + "Impact": "Low", + "Public": "20231009", + "CveID": "CVE-2023-45367" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-732", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45369", + "Impact": "Low", + "Public": "20231009", + "CveID": "CVE-2023-45369" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45370", + "Impact": "Low", + "Public": "20231009", + "CveID": "CVE-2023-45370" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "Cwe": "CWE-770", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45371", + "Impact": "High", + "Public": "20231009", + "CveID": "CVE-2023-45371" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45372", + "Impact": "Low", + "Public": "20231009", + "CveID": "CVE-2023-45372" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45373", + "Impact": "Low", + "Public": "20231009", + "CveID": "CVE-2023-45373" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45374", + "Impact": "Low", + "Public": "20231009", + "CveID": "CVE-2023-45374" + } + ], + "Bugzilla": [ + { + "Id": "44708", + "Href": "https://bugzilla.altlinux.org/44708", + "Data": "Непрописанный файловый конфликт между mediawiki-common и mediawiki-extensions-Math" + }, + { + "Id": "48033", + "Href": "https://bugzilla.altlinux.org/48033", + "Data": "Прошу собрать с PHP 8.2" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241192001", + "Comment": "mediawiki is earlier than 0:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192002", + "Comment": "mediawiki-apache2 is earlier than 0:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192003", + "Comment": "mediawiki-common is earlier than 0:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192004", + "Comment": "mediawiki-extensions-PdfHandler is earlier than 0:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192005", + "Comment": "mediawiki-extensions-Scribunto is earlier than 0:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192006", + "Comment": "mediawiki-extensions-SyntaxHighlight_GeSHi is earlier than 1:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192007", + "Comment": "mediawiki-mysql is earlier than 0:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192008", + "Comment": "mediawiki-php8.1 is earlier than 0:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192009", + "Comment": "mediawiki-php8.2 is earlier than 0:1.40.1-alt2" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241192010", + "Comment": "mediawiki-postgresql is earlier than 0:1.40.1-alt2" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1192/objects.json b/oval/c10f2/ALT-PU-2024-1192/objects.json new file mode 100644 index 0000000000..31af3767fb --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1192/objects.json @@ -0,0 +1,88 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241192001", + "Version": "1", + "comment": "mediawiki is installed", + "Name": "mediawiki" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192002", + "Version": "1", + "comment": "mediawiki-apache2 is installed", + "Name": "mediawiki-apache2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192003", + "Version": "1", + "comment": "mediawiki-common is installed", + "Name": "mediawiki-common" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192004", + "Version": "1", + "comment": "mediawiki-extensions-PdfHandler is installed", + "Name": "mediawiki-extensions-PdfHandler" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192005", + "Version": "1", + "comment": "mediawiki-extensions-Scribunto is installed", + "Name": "mediawiki-extensions-Scribunto" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192006", + "Version": "1", + "comment": "mediawiki-extensions-SyntaxHighlight_GeSHi is installed", + "Name": "mediawiki-extensions-SyntaxHighlight_GeSHi" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192007", + "Version": "1", + "comment": "mediawiki-mysql is installed", + "Name": "mediawiki-mysql" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192008", + "Version": "1", + "comment": "mediawiki-php8.1 is installed", + "Name": "mediawiki-php8.1" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192009", + "Version": "1", + "comment": "mediawiki-php8.2 is installed", + "Name": "mediawiki-php8.2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241192010", + "Version": "1", + "comment": "mediawiki-postgresql is installed", + "Name": "mediawiki-postgresql" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1192/states.json b/oval/c10f2/ALT-PU-2024-1192/states.json new file mode 100644 index 0000000000..f803e5f946 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1192/states.json @@ -0,0 +1,35 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241192001", + "Version": "1", + "Comment": "package EVR is earlier than 0:1.40.1-alt2", + "Arch": {}, + "Evr": { + "Text": "0:1.40.1-alt2", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + }, + { + "ID": "oval:org.altlinux.errata:ste:20241192002", + "Version": "1", + "Comment": "package EVR is earlier than 1:1.40.1-alt2", + "Arch": {}, + "Evr": { + "Text": "1:1.40.1-alt2", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1192/tests.json b/oval/c10f2/ALT-PU-2024-1192/tests.json new file mode 100644 index 0000000000..c1630769ad --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1192/tests.json @@ -0,0 +1,138 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241192001", + "Version": "1", + "Check": "all", + "Comment": "mediawiki is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192002", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-apache2 is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192003", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-common is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192004", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-extensions-PdfHandler is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192004" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192005", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-extensions-Scribunto is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192005" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192006", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-extensions-SyntaxHighlight_GeSHi is earlier than 1:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192006" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192002" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192007", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-mysql is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192007" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192008", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-php8.1 is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192008" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192009", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-php8.2 is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192009" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241192010", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-postgresql is earlier than 0:1.40.1-alt2", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241192010" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241192001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1193/definitions.json b/oval/c10f2/ALT-PU-2024-1193/definitions.json new file mode 100644 index 0000000000..1ab0d6695f --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1193/definitions.json @@ -0,0 +1,192 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241193", + "Version": "oval:org.altlinux.errata:def:20241193", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1193: package `cacti` update to version 1.2.26-alt1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1193", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1193", + "Source": "ALTPU" + }, + { + "RefID": "BDU:2024-00024", + "RefURL": "https://bdu.fstec.ru/vul/2024-00024", + "Source": "BDU" + }, + { + "RefID": "BDU:2024-00089", + "RefURL": "https://bdu.fstec.ru/vul/2024-00089", + "Source": "BDU" + }, + { + "RefID": "CVE-2023-46490", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-46490", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-49084", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-49084", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-49085", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-49085", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-49086", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-49086", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-50250", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-50250", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-50569", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-50569", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-51448", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-51448", + "Source": "CVE" + } + ], + "Description": "This update upgrades cacti to version 1.2.26-alt1. \nSecurity Fix(es):\n\n * BDU:2024-00024: Уязвимость функции SNMP Notification Receivers сценария managers.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольный SQL-код\n\n * BDU:2024-00089: Уязвимость сценария templates_import.php программного средства мониторинга сети Cacti, позволяющая нарушителю проводить межсайтовые сценарные атаки и получить несанкционированный доступ на чтение, изменение или удаление данных\n\n * CVE-2023-46490: SQL Injection vulnerability in Cacti v1.2.25 allows a remote attacker to obtain sensitive information via the form_actions() function in the managers.php function.\n\n * CVE-2023-49084: Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). While using the detected SQL Injection and insufficient processing of the include file path, it is possible to execute arbitrary code on the server. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `link.php`. Impact of the vulnerability execution of arbitrary code on the server. \n\n * CVE-2023-49085: Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist.\n\n * CVE-2023-49086: Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). Bypassing an earlier fix (CVE-2023-39360) that leads to a DOM XSS attack.\nExploitation of the vulnerability is possible for an authorized user. The vulnerable component is\nthe `graphs_new.php`. Impact of the vulnerability - execution of arbitrary javascript code in\nthe attacked user's browser. This issue has been patched in version 1.2.26.\n\n\n * CVE-2023-50250: Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available.\n\n\n * CVE-2023-50569: Reflected Cross Site Scripting (XSS) vulnerability in Cacti v1.2.25, allows remote attackers to escalate privileges when uploading an xml template file via templates_import.php.\n\n * CVE-2023-51448: Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `‘managers.php’`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `‘/cacti/managers.php’` with an SQLi payload in the `‘selected_graphs_array’` HTTP GET parameter. As of time of publication, no patched versions exist.", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "High", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": [ + { + "Cvss": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-89", + "Href": "https://bdu.fstec.ru/vul/2024-00024", + "Impact": "High", + "Public": "20231221", + "CveID": "BDU:2024-00024" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "Cvss3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "Cwe": "CWE-79", + "Href": "https://bdu.fstec.ru/vul/2024-00089", + "Impact": "Low", + "Public": "20231113", + "CveID": "BDU:2024-00089" + } + ], + "Cves": [ + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-89", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-46490", + "Impact": "Low", + "Public": "20231027", + "CveID": "CVE-2023-46490" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-98", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-49084", + "Impact": "High", + "Public": "20231221", + "CveID": "CVE-2023-49084" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-89", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-49085", + "Impact": "High", + "Public": "20231222", + "CveID": "CVE-2023-49085" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-49086", + "Impact": "Low", + "Public": "20231222", + "CveID": "CVE-2023-49086" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-50250", + "Impact": "Low", + "Public": "20231222", + "CveID": "CVE-2023-50250" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-50569", + "Impact": "Low", + "Public": "20231222", + "CveID": "CVE-2023-50569" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-89", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-51448", + "Impact": "High", + "Public": "20231222", + "CveID": "CVE-2023-51448" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241193001", + "Comment": "cacti is earlier than 0:1.2.26-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241193002", + "Comment": "cacti-setup is earlier than 0:1.2.26-alt1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1193/objects.json b/oval/c10f2/ALT-PU-2024-1193/objects.json new file mode 100644 index 0000000000..abca27a5dd --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1193/objects.json @@ -0,0 +1,40 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241193001", + "Version": "1", + "comment": "cacti is installed", + "Name": "cacti" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241193002", + "Version": "1", + "comment": "cacti-setup is installed", + "Name": "cacti-setup" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1193/states.json b/oval/c10f2/ALT-PU-2024-1193/states.json new file mode 100644 index 0000000000..d138982305 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1193/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241193001", + "Version": "1", + "Comment": "package EVR is earlier than 0:1.2.26-alt1", + "Arch": {}, + "Evr": { + "Text": "0:1.2.26-alt1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1193/tests.json b/oval/c10f2/ALT-PU-2024-1193/tests.json new file mode 100644 index 0000000000..8b923ad9e8 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1193/tests.json @@ -0,0 +1,42 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241193001", + "Version": "1", + "Check": "all", + "Comment": "cacti is earlier than 0:1.2.26-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241193001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241193001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241193002", + "Version": "1", + "Check": "all", + "Comment": "cacti-setup is earlier than 0:1.2.26-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241193002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241193001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1194/definitions.json b/oval/c10f2/ALT-PU-2024-1194/definitions.json new file mode 100644 index 0000000000..a4fdf02354 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1194/definitions.json @@ -0,0 +1,89 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241194", + "Version": "oval:org.altlinux.errata:def:20241194", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1194: package `jobe` update to version 1.9.0-alt1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1194", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1194", + "Source": "ALTPU" + }, + { + "RefID": "CVE-2020-36642", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36642", + "Source": "CVE" + } + ], + "Description": "This update upgrades jobe to version 1.9.0-alt1. \nSecurity Fix(es):\n\n * CVE-2020-36642: A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability.", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Critical", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": null, + "Cves": [ + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-77", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36642", + "Impact": "Critical", + "Public": "20230106", + "CveID": "CVE-2020-36642" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241194001", + "Comment": "jobe is earlier than 0:1.9.0-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241194002", + "Comment": "jobe-apache2 is earlier than 0:1.9.0-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241194003", + "Comment": "jobe-mysql is earlier than 0:1.9.0-alt1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1194/objects.json b/oval/c10f2/ALT-PU-2024-1194/objects.json new file mode 100644 index 0000000000..23a5ee2ed6 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1194/objects.json @@ -0,0 +1,46 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241194001", + "Version": "1", + "comment": "jobe is installed", + "Name": "jobe" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241194002", + "Version": "1", + "comment": "jobe-apache2 is installed", + "Name": "jobe-apache2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241194003", + "Version": "1", + "comment": "jobe-mysql is installed", + "Name": "jobe-mysql" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1194/states.json b/oval/c10f2/ALT-PU-2024-1194/states.json new file mode 100644 index 0000000000..43e80173e4 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1194/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241194001", + "Version": "1", + "Comment": "package EVR is earlier than 0:1.9.0-alt1", + "Arch": {}, + "Evr": { + "Text": "0:1.9.0-alt1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1194/tests.json b/oval/c10f2/ALT-PU-2024-1194/tests.json new file mode 100644 index 0000000000..bae27e431d --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1194/tests.json @@ -0,0 +1,54 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241194001", + "Version": "1", + "Check": "all", + "Comment": "jobe is earlier than 0:1.9.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241194001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241194001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241194002", + "Version": "1", + "Check": "all", + "Comment": "jobe-apache2 is earlier than 0:1.9.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241194002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241194001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241194003", + "Version": "1", + "Check": "all", + "Comment": "jobe-mysql is earlier than 0:1.9.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241194003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241194001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1195/definitions.json b/oval/c10f2/ALT-PU-2024-1195/definitions.json new file mode 100644 index 0000000000..9b282dee0f --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1195/definitions.json @@ -0,0 +1,138 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241195", + "Version": "oval:org.altlinux.errata:def:20241195", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1195: package `moodle` update to version 4.3.0-alt1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1195", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1195", + "Source": "ALTPU" + }, + { + "RefID": "CVE-2022-39369", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39369", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40316", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40316", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40317", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40317", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40318", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40318", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40319", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40319", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40320", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40320", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40322", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40322", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40323", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40323", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40324", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40324", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-40325", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40325", + "Source": "CVE" + } + ], + "Description": "This update upgrades moodle to version 4.3.0-alt1. \nSecurity Fix(es):\n\n * CVE-2022-39369: phpCAS is an authentication library that allows PHP applications to easily authenticate users via a Central Authentication Service (CAS) server. The phpCAS library uses HTTP headers to determine the service URL used to validate tickets. This allows an attacker to control the host header and use a valid ticket granted for any authorized service in the same SSO realm (CAS server) to authenticate to the service protected by phpCAS. Depending on the settings of the CAS server service registry in worst case this may be any other service URL (if the allowed URLs are configured to \"^(https)://.*\") or may be strictly limited to known and authorized services in the same SSO federation if proper URL service validation is applied. This vulnerability may allow an attacker to gain access to a victim's account on a vulnerable CASified service without victim's knowledge, when the victim visits attacker's website while being logged in to the same CAS server. phpCAS 1.6.0 is a major version upgrade that starts enforcing service URL discovery validation, because there is unfortunately no 100% safe default config to use in PHP. Starting this version, it is required to pass in an additional service base URL argument when constructing the client class. For more information, please refer to the upgrading doc. This vulnerability only impacts the CAS client that the phpCAS library protects against. The problematic service URL discovery behavior in phpCAS \u003c 1.6.0 will only be disabled, and thus you are not impacted from it, if the phpCAS configuration has the following setup: 1. `phpCAS::setUrl()` is called (a reminder that you have to pass in the full URL of the current page, rather than your service base URL), and 2. `phpCAS::setCallbackURL()` is called, only when the proxy mode is enabled. 3. If your PHP's HTTP header input `X-Forwarded-Host`, `X-Forwarded-Server`, `Host`, `X-Forwarded-Proto`, `X-Forwarded-Protocol` is sanitized before reaching PHP (by a reverse proxy, for example), you will not be impacted by this vulnerability either. If your CAS server service registry is configured to only allow known and trusted service URLs the severity of the vulnerability is reduced substantially in its severity since an attacker must be in control of another authorized service. Otherwise, you should upgrade the library to get the safe service discovery behavior.\n\n * CVE-2023-40316: description unavailable\n\n * CVE-2023-40317: description unavailable\n\n * CVE-2023-40318: description unavailable\n\n * CVE-2023-40319: description unavailable\n\n * CVE-2023-40320: description unavailable\n\n * CVE-2023-40322: description unavailable\n\n * CVE-2023-40323: description unavailable\n\n * CVE-2023-40324: description unavailable\n\n * CVE-2023-40325: description unavailable", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "High", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": null, + "Cves": [ + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-99", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39369", + "Impact": "High", + "Public": "20221101", + "CveID": "CVE-2022-39369" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241195001", + "Comment": "moodle is earlier than 0:4.3.0-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241195002", + "Comment": "moodle-apache2 is earlier than 0:4.3.0-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241195003", + "Comment": "moodle-base is earlier than 0:4.3.0-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241195004", + "Comment": "moodle-local-mysql is earlier than 0:4.3.0-alt1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1195/objects.json b/oval/c10f2/ALT-PU-2024-1195/objects.json new file mode 100644 index 0000000000..77c444e0b5 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1195/objects.json @@ -0,0 +1,52 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241195001", + "Version": "1", + "comment": "moodle is installed", + "Name": "moodle" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241195002", + "Version": "1", + "comment": "moodle-apache2 is installed", + "Name": "moodle-apache2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241195003", + "Version": "1", + "comment": "moodle-base is installed", + "Name": "moodle-base" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241195004", + "Version": "1", + "comment": "moodle-local-mysql is installed", + "Name": "moodle-local-mysql" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1195/states.json b/oval/c10f2/ALT-PU-2024-1195/states.json new file mode 100644 index 0000000000..d6038d4a23 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1195/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241195001", + "Version": "1", + "Comment": "package EVR is earlier than 0:4.3.0-alt1", + "Arch": {}, + "Evr": { + "Text": "0:4.3.0-alt1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1195/tests.json b/oval/c10f2/ALT-PU-2024-1195/tests.json new file mode 100644 index 0000000000..10c8444a9c --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1195/tests.json @@ -0,0 +1,66 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241195001", + "Version": "1", + "Check": "all", + "Comment": "moodle is earlier than 0:4.3.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241195001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241195001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241195002", + "Version": "1", + "Check": "all", + "Comment": "moodle-apache2 is earlier than 0:4.3.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241195002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241195001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241195003", + "Version": "1", + "Check": "all", + "Comment": "moodle-base is earlier than 0:4.3.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241195003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241195001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241195004", + "Version": "1", + "Check": "all", + "Comment": "moodle-local-mysql is earlier than 0:4.3.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241195004" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241195001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1196/definitions.json b/oval/c10f2/ALT-PU-2024-1196/definitions.json new file mode 100644 index 0000000000..f9559fe957 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1196/definitions.json @@ -0,0 +1,529 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241196", + "Version": "oval:org.altlinux.errata:def:20241196", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1196: package `nextcloud` update to version 27.1.4-alt1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1196", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1196", + "Source": "ALTPU" + }, + { + "RefID": "BDU:2023-03598", + "RefURL": "https://bdu.fstec.ru/vul/2023-03598", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-03776", + "RefURL": "https://bdu.fstec.ru/vul/2023-03776", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05873", + "RefURL": "https://bdu.fstec.ru/vul/2023-05873", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05874", + "RefURL": "https://bdu.fstec.ru/vul/2023-05874", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05875", + "RefURL": "https://bdu.fstec.ru/vul/2023-05875", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05876", + "RefURL": "https://bdu.fstec.ru/vul/2023-05876", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-05877", + "RefURL": "https://bdu.fstec.ru/vul/2023-05877", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-06928", + "RefURL": "https://bdu.fstec.ru/vul/2023-06928", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07158", + "RefURL": "https://bdu.fstec.ru/vul/2023-07158", + "Source": "BDU" + }, + { + "RefID": "BDU:2023-07159", + "RefURL": "https://bdu.fstec.ru/vul/2023-07159", + "Source": "BDU" + }, + { + "RefID": "CVE-2023-32318", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32318", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-32320", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32320", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-35171", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35171", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-35172", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35172", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-35927", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35927", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-35928", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35928", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-39952", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-39952", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-39958", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-39958", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-39959", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-39959", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-39960", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-39960", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-39961", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-39961", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-39962", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-39962", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-39963", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-39963", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45148", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45148", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-45151", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45151", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-48239", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48239", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-48301", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48301", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-48302", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48302", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-48303", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48303", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-48304", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48304", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-48305", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48305", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-48306", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48306", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-49791", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-49791", + "Source": "CVE" + }, + { + "RefID": "CVE-2023-49792", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-49792", + "Source": "CVE" + } + ], + "Description": "This update upgrades nextcloud to version 27.1.4-alt1. \nSecurity Fix(es):\n\n * BDU:2023-03598: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным ограничением чрезмерных попыток аутентификации, позволяющая нарушителю скомпрометировать целевую систему\n\n * BDU:2023-03776: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным обращением с недостаточными привилегиями, позволяющая нарушителю получить доступ к учетным данным других пользователей.\n\n * BDU:2023-05873: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным контролем доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-05874: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным контролем доступа, позволяющая нарушителю изменить пароль пользователя\n\n * BDU:2023-05875: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным контролем доступа, позволяющая нарушителю удалить любое личное или глобальное внешнее хранилище, сделав его недоступным для всех остальных\n\n * BDU:2023-05876: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным контролем доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2023-05877: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным ограничением чрезмерных попыток аутентификации, позволяющая нарушителю перебрать секретные данные настроенных клиентов OAuth2\n\n * BDU:2023-06928: Уязвимость интерфейса API WebDAV облачного программного обеспечения для создания и использования хранилища данных Nextcloud, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2023-07158: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная хранением токенов OAuth2 в открытом виде, позволяющая нарушителю получить доступ к серверу и повысить свои привилегии\n\n * BDU:2023-07159: Уязвимость компонента Memcached облачного программного обеспечения для создания и использования хранилища данных Nextcloud, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2023-32318: Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.\n\n * CVE-2023-32320: Nextcloud Server is a data storage system for Nextcloud, a self-hosted productivity platform. When multiple requests are sent in parallel, all of them were executed even if the amount of faulty requests succeeded the limit by the time the response was sent to the client. This allowed someone to send as many requests the server could handle in parallel to bruteforce protected details instead of the configured limit, default 8. Nextcloud Server versions 25.0.7 and 26.0.2 and Nextcloud Enterprise Server versions 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 and 26.0.2 contain patches for this issue.\n\n\n * CVE-2023-35171: NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker's site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-35172: NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, an attacker can bruteforce the password reset links. Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-35927: NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again.\n\nNextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the \"Administration\" \u003e \"Sharing\" settings `…/index.php/settings/admin/sharing`. Afterwards, trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`.\n\n * CVE-2023-35928: Nextcloud Server is a space for data storage on Nextcloud, a self-hosted productivity playform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 19.0.0 until 19.0.13.9, 20.0.0 until 20.0.14.14, 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, a user could use this functionality to get access to the login credentials of another user and take over their account. This issue has been patched in Nextcloud Server versions 25.0.7 and 26.0.2 and NextCloud Enterprise Server versions 19.0.13.9, 20.0.14.14, 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2.\n\nThree workarounds are available. Disable app files_external. Change config setting \"Allow users to mount external storage\" to disabled in \"Administration\" \u003e \"External storage\" settings `…/index.php/settings/admin/externalstorages`. Change config setting to disallow users to create external storages in \"Administration\" \u003e \"External storage\" settings `…/index.php/settings/admin/externalstorages` with the types FTP, Nextcloud, SFTP, and/or WebDAV.\n\n * CVE-2023-39952: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1, a user can access files inside a subfolder of a groupfolder accessible to them, even if advanced permissions would block access to the subfolder. Nextcloud Server versions 25.0.8, 26.0.3, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-39958: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, missing protection allows an attacker to brute force the client secrets of configured OAuth2 clients. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-39959: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.9, 26.0.4, and 27.0.1, unauthenticated users could send a DAV request which reveals whether a calendar or an address book with the given identifier exists for the victim. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-39960: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available.\n\n * CVE-2023-39961: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 24.0.4 and prior to versions 25.0.9, 26.0.4, and 27.0.1, when a folder with images or an image was shared without download permissions, the user could add the image inline into a text file and download it. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-39962: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 19.0.0 and prior to versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a malicious user could delete any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. As a workaround, disable app files_external. This also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.\n\n * CVE-2023-39963: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 20.0.0 and prior to versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a missing password confirmation allowed an attacker, after successfully stealing a session from a logged in user, to create app passwords for the victim. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-45148: Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\\OC\\Memcache\\Redis` and install Redis instead of Memcached.\n\n * CVE-2023-45151: Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.\n\n * CVE-2023-48239: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and starting in version 20.0.0 and prior to versions 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Enterprise Server, a malicious user could update any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud Server 25.0.13, 26.0.8, and 27.1.3 and Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 contain a patch for this issue. As a workaround, disable app files_external. This workaround also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.\n\n * CVE-2023-48301: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.\n\n * CVE-2023-48302: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, when a user is tricked into copy pasting HTML code without markup (Ctrl+Shift+V) the markup will actually render. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app text.\n\n * CVE-2023-48303: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, admins can change authentication details of user configured external storage. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-48304: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, an attacker could enable and disable the birthday calendar for any user on the same server. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.\n\n * CVE-2023-48305: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users' passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments).\n\n * CVE-2023-48306: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.\n\n * CVE-2023-49791: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when an attacker manages to get access to an active session of another user via another way, they could delete and modify workflows by sending calls directly to the API bypassing the password confirmation shown in the UI. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-49792: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Critical", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": [ + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:N", + "Cvss3": "AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", + "Cwe": "CWE-307", + "Href": "https://bdu.fstec.ru/vul/2023-03598", + "Impact": "High", + "Public": "20230623", + "CveID": "BDU:2023-03598" + }, + { + "Cvss": "AV:N/AC:L/Au:M/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "Cwe": "CWE-274", + "Href": "https://bdu.fstec.ru/vul/2023-03776", + "Impact": "High", + "Public": "20230623", + "CveID": "BDU:2023-03776" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-284", + "Href": "https://bdu.fstec.ru/vul/2023-05873", + "Impact": "Low", + "Public": "20230810", + "CveID": "BDU:2023-05873" + }, + { + "Cvss": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "Cvss3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-284", + "Href": "https://bdu.fstec.ru/vul/2023-05874", + "Impact": "High", + "Public": "20230810", + "CveID": "BDU:2023-05874" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "Cwe": "CWE-284", + "Href": "https://bdu.fstec.ru/vul/2023-05875", + "Impact": "High", + "Public": "20230810", + "CveID": "BDU:2023-05875" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-284", + "Href": "https://bdu.fstec.ru/vul/2023-05876", + "Impact": "Low", + "Public": "20230810", + "CveID": "BDU:2023-05876" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-307", + "Href": "https://bdu.fstec.ru/vul/2023-05877", + "Impact": "Low", + "Public": "20230810", + "CveID": "BDU:2023-05877" + }, + { + "Cvss": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-307", + "Href": "https://bdu.fstec.ru/vul/2023-06928", + "Impact": "High", + "Public": "20231013", + "CveID": "BDU:2023-06928" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-312", + "Href": "https://bdu.fstec.ru/vul/2023-07158", + "Impact": "High", + "Public": "20231016", + "CveID": "BDU:2023-07158" + }, + { + "Cvss": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "Cvss3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "Cwe": "CWE-307", + "Href": "https://bdu.fstec.ru/vul/2023-07159", + "Impact": "Low", + "Public": "20231016", + "CveID": "BDU:2023-07159" + } + ], + "Cves": [ + { + "Cvss3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "CWE-613", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32318", + "Impact": "Low", + "Public": "20230526", + "CveID": "CVE-2023-32318" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-307", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32320", + "Impact": "High", + "Public": "20230622", + "CveID": "CVE-2023-32320" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-601", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35171", + "Impact": "Low", + "Public": "20230623", + "CveID": "CVE-2023-35171" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "Cwe": "CWE-307", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35172", + "Impact": "Critical", + "Public": "20230623", + "CveID": "CVE-2023-35172" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35927", + "Impact": "High", + "Public": "20230623", + "CveID": "CVE-2023-35927" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35928", + "Impact": "High", + "Public": "20230623", + "CveID": "CVE-2023-35928" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-284", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-39952", + "Impact": "Low", + "Public": "20230810", + "CveID": "CVE-2023-39952" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-307", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-39958", + "Impact": "Low", + "Public": "20230810", + "CveID": "CVE-2023-39958" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "Cwe": "CWE-284", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-39959", + "Impact": "Low", + "Public": "20230810", + "CveID": "CVE-2023-39959" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-307", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-39960", + "Impact": "High", + "Public": "20231013", + "CveID": "CVE-2023-39960" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "Cwe": "CWE-284", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-39961", + "Impact": "Low", + "Public": "20230810", + "CveID": "CVE-2023-39961" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "Cwe": "CWE-284", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-39962", + "Impact": "High", + "Public": "20230810", + "CveID": "CVE-2023-39962" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "Cwe": "NVD-CWE-noinfo", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-39963", + "Impact": "High", + "Public": "20230810", + "CveID": "CVE-2023-39963" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "Cwe": "CWE-307", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45148", + "Impact": "Low", + "Public": "20231016", + "CveID": "CVE-2023-45148" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-312", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45151", + "Impact": "High", + "Public": "20231016", + "CveID": "CVE-2023-45151" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "Cwe": "NVD-CWE-Other", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48239", + "Impact": "High", + "Public": "20231121", + "CveID": "CVE-2023-48239" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48301", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-48301" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48302", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-48302" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "Cwe": "NVD-CWE-Other", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48303", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-48303" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "Cwe": "CWE-639", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48304", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-48304" + }, + { + "Cvss3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "Cwe": "CWE-312", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48305", + "Impact": "Low", + "Public": "20231121", + "CveID": "CVE-2023-48305" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-918", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48306", + "Impact": "Critical", + "Public": "20231121", + "CveID": "CVE-2023-48306" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "Cwe": "CWE-287", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-49791", + "Impact": "Low", + "Public": "20231222", + "CveID": "CVE-2023-49791" + }, + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "Cwe": "CWE-307", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-49792", + "Impact": "Critical", + "Public": "20231222", + "CveID": "CVE-2023-49792" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241196001", + "Comment": "nextcloud is earlier than 0:27.1.4-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241196002", + "Comment": "nextcloud-apache2 is earlier than 0:27.1.4-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241196003", + "Comment": "nextcloud-nginx is earlier than 0:27.1.4-alt1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1196/objects.json b/oval/c10f2/ALT-PU-2024-1196/objects.json new file mode 100644 index 0000000000..2e1ade73c7 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1196/objects.json @@ -0,0 +1,46 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241196001", + "Version": "1", + "comment": "nextcloud is installed", + "Name": "nextcloud" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241196002", + "Version": "1", + "comment": "nextcloud-apache2 is installed", + "Name": "nextcloud-apache2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241196003", + "Version": "1", + "comment": "nextcloud-nginx is installed", + "Name": "nextcloud-nginx" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1196/states.json b/oval/c10f2/ALT-PU-2024-1196/states.json new file mode 100644 index 0000000000..8a0068405b --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1196/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241196001", + "Version": "1", + "Comment": "package EVR is earlier than 0:27.1.4-alt1", + "Arch": {}, + "Evr": { + "Text": "0:27.1.4-alt1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1196/tests.json b/oval/c10f2/ALT-PU-2024-1196/tests.json new file mode 100644 index 0000000000..04c8963949 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1196/tests.json @@ -0,0 +1,54 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241196001", + "Version": "1", + "Check": "all", + "Comment": "nextcloud is earlier than 0:27.1.4-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241196001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241196001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241196002", + "Version": "1", + "Check": "all", + "Comment": "nextcloud-apache2 is earlier than 0:27.1.4-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241196002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241196001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241196003", + "Version": "1", + "Check": "all", + "Comment": "nextcloud-nginx is earlier than 0:27.1.4-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241196003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241196001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1329/definitions.json b/oval/c10f2/ALT-PU-2024-1329/definitions.json new file mode 100644 index 0000000000..5520d70336 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1329/definitions.json @@ -0,0 +1,125 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241329", + "Version": "oval:org.altlinux.errata:def:20241329", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1329: package `sogo` update to version 5.9.1-alt1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1329", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1329", + "Source": "ALTPU" + }, + { + "RefID": "CVE-2023-48104", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48104", + "Source": "CVE" + } + ], + "Description": "This update upgrades sogo to version 5.9.1-alt1. \nSecurity Fix(es):\n\n * CVE-2023-48104: Alinto SOGo before 5.9.1 is vulnerable to HTML Injection.", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Low", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": null, + "Cves": [ + { + "Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "Cwe": "CWE-79", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48104", + "Impact": "Low", + "Public": "20240116", + "CveID": "CVE-2023-48104" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241329001", + "Comment": "sogo is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329002", + "Comment": "sogo-activesync is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329003", + "Comment": "sogo-apache2 is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329004", + "Comment": "sogo-devel is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329005", + "Comment": "sogo-ealarms-notify is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329006", + "Comment": "sogo-slapd-sockd is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329007", + "Comment": "sogo-tool is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329008", + "Comment": "sope-cards is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329009", + "Comment": "sope-cards-devel is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329010", + "Comment": "sope-gdl1-contentstore is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329011", + "Comment": "sope-gdl1-contentstore-devel is earlier than 0:5.9.1-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241329012", + "Comment": "task-sogo is earlier than 0:5.9.1-alt1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1329/objects.json b/oval/c10f2/ALT-PU-2024-1329/objects.json new file mode 100644 index 0000000000..0adf776254 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1329/objects.json @@ -0,0 +1,100 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241329001", + "Version": "1", + "comment": "sogo is installed", + "Name": "sogo" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329002", + "Version": "1", + "comment": "sogo-activesync is installed", + "Name": "sogo-activesync" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329003", + "Version": "1", + "comment": "sogo-apache2 is installed", + "Name": "sogo-apache2" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329004", + "Version": "1", + "comment": "sogo-devel is installed", + "Name": "sogo-devel" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329005", + "Version": "1", + "comment": "sogo-ealarms-notify is installed", + "Name": "sogo-ealarms-notify" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329006", + "Version": "1", + "comment": "sogo-slapd-sockd is installed", + "Name": "sogo-slapd-sockd" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329007", + "Version": "1", + "comment": "sogo-tool is installed", + "Name": "sogo-tool" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329008", + "Version": "1", + "comment": "sope-cards is installed", + "Name": "sope-cards" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329009", + "Version": "1", + "comment": "sope-cards-devel is installed", + "Name": "sope-cards-devel" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329010", + "Version": "1", + "comment": "sope-gdl1-contentstore is installed", + "Name": "sope-gdl1-contentstore" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329011", + "Version": "1", + "comment": "sope-gdl1-contentstore-devel is installed", + "Name": "sope-gdl1-contentstore-devel" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241329012", + "Version": "1", + "comment": "task-sogo is installed", + "Name": "task-sogo" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1329/states.json b/oval/c10f2/ALT-PU-2024-1329/states.json new file mode 100644 index 0000000000..962918f144 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1329/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241329001", + "Version": "1", + "Comment": "package EVR is earlier than 0:5.9.1-alt1", + "Arch": {}, + "Evr": { + "Text": "0:5.9.1-alt1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1329/tests.json b/oval/c10f2/ALT-PU-2024-1329/tests.json new file mode 100644 index 0000000000..0e9c19a9bf --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1329/tests.json @@ -0,0 +1,162 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241329001", + "Version": "1", + "Check": "all", + "Comment": "sogo is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329002", + "Version": "1", + "Check": "all", + "Comment": "sogo-activesync is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329003", + "Version": "1", + "Check": "all", + "Comment": "sogo-apache2 is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329004", + "Version": "1", + "Check": "all", + "Comment": "sogo-devel is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329004" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329005", + "Version": "1", + "Check": "all", + "Comment": "sogo-ealarms-notify is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329005" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329006", + "Version": "1", + "Check": "all", + "Comment": "sogo-slapd-sockd is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329006" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329007", + "Version": "1", + "Check": "all", + "Comment": "sogo-tool is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329007" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329008", + "Version": "1", + "Check": "all", + "Comment": "sope-cards is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329008" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329009", + "Version": "1", + "Check": "all", + "Comment": "sope-cards-devel is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329009" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329010", + "Version": "1", + "Check": "all", + "Comment": "sope-gdl1-contentstore is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329010" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329011", + "Version": "1", + "Check": "all", + "Comment": "sope-gdl1-contentstore-devel is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329011" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241329012", + "Version": "1", + "Check": "all", + "Comment": "task-sogo is earlier than 0:5.9.1-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241329012" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241329001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1333/definitions.json b/oval/c10f2/ALT-PU-2024-1333/definitions.json new file mode 100644 index 0000000000..015a62a709 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1333/definitions.json @@ -0,0 +1,127 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241333", + "Version": "oval:org.altlinux.errata:def:20241333", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1333: package `openssh` update to version 7.9p1-alt4.p10.4", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1333", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1333", + "Source": "ALTPU" + }, + { + "RefID": "BDU:2023-08853", + "RefURL": "https://bdu.fstec.ru/vul/2023-08853", + "Source": "BDU" + }, + { + "RefID": "CVE-2023-48795", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795", + "Source": "CVE" + } + ], + "Description": "This update upgrades openssh to version 7.9p1-alt4.p10.4. \nSecurity Fix(es):\n\n * BDU:2023-08853: Уязвимость реализации протокола SSH, связанная с возможностью откорректировать порядковые номера пакетов в процессе согласования соединения и добиться удаления произвольного числа служебных SSH-сообщений, позволяющая нарушителю обойти проверки целостности, отключить существующие функции безопасности, получить несанкционированный доступ к защищаемой информации\n\n * CVE-2023-48795: The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.\n\n * #45029: Неверный код возврата при запуске ssh-agent", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "High", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": [ + { + "Cvss": "AV:N/AC:H/Au:N/C:C/I:C/A:N", + "Cvss3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "Cwe": "CWE-222", + "Href": "https://bdu.fstec.ru/vul/2023-08853", + "Impact": "High", + "Public": "20231218", + "CveID": "BDU:2023-08853" + } + ], + "Cves": [ + { + "Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "Cwe": "CWE-354", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795", + "Impact": "Low", + "Public": "20231218", + "CveID": "CVE-2023-48795" + } + ], + "Bugzilla": [ + { + "Id": "45029", + "Href": "https://bugzilla.altlinux.org/45029", + "Data": "Неверный код возврата при запуске ssh-agent" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241333001", + "Comment": "openssh is earlier than 0:7.9p1-alt4.p10.4" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241333002", + "Comment": "openssh-askpass-common is earlier than 0:7.9p1-alt4.p10.4" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241333003", + "Comment": "openssh-clients is earlier than 0:7.9p1-alt4.p10.4" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241333004", + "Comment": "openssh-common is earlier than 0:7.9p1-alt4.p10.4" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241333005", + "Comment": "openssh-keysign is earlier than 0:7.9p1-alt4.p10.4" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241333006", + "Comment": "openssh-server is earlier than 0:7.9p1-alt4.p10.4" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20241333007", + "Comment": "openssh-server-control is earlier than 0:7.9p1-alt4.p10.4" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1333/objects.json b/oval/c10f2/ALT-PU-2024-1333/objects.json new file mode 100644 index 0000000000..240bb39ae1 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1333/objects.json @@ -0,0 +1,70 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241333001", + "Version": "1", + "comment": "openssh is installed", + "Name": "openssh" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241333002", + "Version": "1", + "comment": "openssh-askpass-common is installed", + "Name": "openssh-askpass-common" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241333003", + "Version": "1", + "comment": "openssh-clients is installed", + "Name": "openssh-clients" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241333004", + "Version": "1", + "comment": "openssh-common is installed", + "Name": "openssh-common" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241333005", + "Version": "1", + "comment": "openssh-keysign is installed", + "Name": "openssh-keysign" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241333006", + "Version": "1", + "comment": "openssh-server is installed", + "Name": "openssh-server" + }, + { + "ID": "oval:org.altlinux.errata:obj:20241333007", + "Version": "1", + "comment": "openssh-server-control is installed", + "Name": "openssh-server-control" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1333/states.json b/oval/c10f2/ALT-PU-2024-1333/states.json new file mode 100644 index 0000000000..24dcb5f9a6 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1333/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241333001", + "Version": "1", + "Comment": "package EVR is earlier than 0:7.9p1-alt4.p10.4", + "Arch": {}, + "Evr": { + "Text": "0:7.9p1-alt4.p10.4", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1333/tests.json b/oval/c10f2/ALT-PU-2024-1333/tests.json new file mode 100644 index 0000000000..a35ab6d177 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1333/tests.json @@ -0,0 +1,102 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241333001", + "Version": "1", + "Check": "all", + "Comment": "openssh is earlier than 0:7.9p1-alt4.p10.4", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241333001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241333001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241333002", + "Version": "1", + "Check": "all", + "Comment": "openssh-askpass-common is earlier than 0:7.9p1-alt4.p10.4", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241333002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241333001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241333003", + "Version": "1", + "Check": "all", + "Comment": "openssh-clients is earlier than 0:7.9p1-alt4.p10.4", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241333003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241333001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241333004", + "Version": "1", + "Check": "all", + "Comment": "openssh-common is earlier than 0:7.9p1-alt4.p10.4", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241333004" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241333001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241333005", + "Version": "1", + "Check": "all", + "Comment": "openssh-keysign is earlier than 0:7.9p1-alt4.p10.4", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241333005" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241333001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241333006", + "Version": "1", + "Check": "all", + "Comment": "openssh-server is earlier than 0:7.9p1-alt4.p10.4", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241333006" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241333001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20241333007", + "Version": "1", + "Check": "all", + "Comment": "openssh-server-control is earlier than 0:7.9p1-alt4.p10.4", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241333007" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241333001" + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1370/definitions.json b/oval/c10f2/ALT-PU-2024-1370/definitions.json new file mode 100644 index 0000000000..16eb5b0fc0 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1370/definitions.json @@ -0,0 +1,73 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20241370", + "Version": "oval:org.altlinux.errata:def:20241370", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-1370: package `mediawiki-extensions-Math` update to version 3.0.0.1.40-alt1.4cf19b0", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch c10f2" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-1370", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-1370", + "Source": "ALTPU" + } + ], + "Description": "This update upgrades mediawiki-extensions-Math to version 3.0.0.1.40-alt1.4cf19b0. \nSecurity Fix(es):\n\n * #46923: Собрать с php8", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Low", + "Rights": "Copyright 2023 BaseALT Ltd.", + "Issued": { + "Date": "2024-01-26" + }, + "Updated": { + "Date": "2024-01-26" + }, + "bdu": null, + "Bugzilla": [ + { + "Id": "46923", + "Href": "https://bugzilla.altlinux.org/46923", + "Data": "Собрать с php8" + } + ], + "AffectedCpeList": { + "Cpe": [ + "cpe:/o:alt:spworkstation:10", + "cpe:/o:alt:spserver:10" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:5001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20241370001", + "Comment": "mediawiki-extensions-Math is earlier than 0:3.0.0.1.40-alt1.4cf19b0" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1370/objects.json b/oval/c10f2/ALT-PU-2024-1370/objects.json new file mode 100644 index 0000000000..8470c64d04 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1370/objects.json @@ -0,0 +1,34 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:5001", + "Version": "1", + "comment": "Evaluate `/etc/os-release` file content", + "Path": { + "dataType": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RpmInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20241370001", + "Version": "1", + "comment": "mediawiki-extensions-Math is installed", + "Name": "mediawiki-extensions-Math" + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1370/states.json b/oval/c10f2/ALT-PU-2024-1370/states.json new file mode 100644 index 0000000000..e584d605d5 --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1370/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:5001", + "Version": "1", + "Text": {} + } + ], + "RpmInfoState": [ + { + "ID": "oval:org.altlinux.errata:ste:20241370001", + "Version": "1", + "Comment": "package EVR is earlier than 0:3.0.0.1.40-alt1.4cf19b0", + "Arch": {}, + "Evr": { + "Text": "0:3.0.0.1.40-alt1.4cf19b0", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/c10f2/ALT-PU-2024-1370/tests.json b/oval/c10f2/ALT-PU-2024-1370/tests.json new file mode 100644 index 0000000000..1eb312658c --- /dev/null +++ b/oval/c10f2/ALT-PU-2024-1370/tests.json @@ -0,0 +1,30 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:5001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'c10f2' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:5001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:5001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20241370001", + "Version": "1", + "Check": "all", + "Comment": "mediawiki-extensions-Math is earlier than 0:3.0.0.1.40-alt1.4cf19b0", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20241370001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20241370001" + } + } + ] +} \ No newline at end of file