From c23008a79b48fbe911bdadddd38dd6d1964d7314 Mon Sep 17 00:00:00 2001 From: pepelyaevip Date: Tue, 23 Apr 2024 21:02:09 +0000 Subject: [PATCH] ALT Vulnerability --- oval/p10/ALT-PU-2024-6721/definitions.json | 218 +++++++++++++++++++++ oval/p10/ALT-PU-2024-6721/objects.json | 46 +++++ oval/p10/ALT-PU-2024-6721/states.json | 23 +++ oval/p10/ALT-PU-2024-6721/tests.json | 54 +++++ 4 files changed, 341 insertions(+) create mode 100644 oval/p10/ALT-PU-2024-6721/definitions.json create mode 100644 oval/p10/ALT-PU-2024-6721/objects.json create mode 100644 oval/p10/ALT-PU-2024-6721/states.json create mode 100644 oval/p10/ALT-PU-2024-6721/tests.json diff --git a/oval/p10/ALT-PU-2024-6721/definitions.json b/oval/p10/ALT-PU-2024-6721/definitions.json new file mode 100644 index 0000000000..010e41f68f --- /dev/null +++ b/oval/p10/ALT-PU-2024-6721/definitions.json @@ -0,0 +1,218 @@ +{ + "Definition": [ + { + "ID": "oval:org.altlinux.errata:def:20246721", + "Version": "oval:org.altlinux.errata:def:20246721", + "Class": "patch", + "Metadata": { + "Title": "ALT-PU-2024-6721: package `firefox-esr` update to version 115.10.0-alt1", + "AffectedList": [ + { + "Family": "unix", + "Platforms": [ + "ALT Linux branch p10" + ], + "Products": [ + "ALT Server", + "ALT Virtualization Server", + "ALT Workstation", + "ALT Workstation K", + "ALT Education", + "Simply Linux", + "Starterkit" + ] + } + ], + "References": [ + { + "RefID": "ALT-PU-2024-6721", + "RefURL": "https://errata.altlinux.org/ALT-PU-2024-6721", + "Source": "ALTPU" + }, + { + "RefID": "BDU:2024-02338", + "RefURL": "https://bdu.fstec.ru/vul/2024-02338", + "Source": "BDU" + }, + { + "RefID": "CVE-2024-2609", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-2609", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-3302", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3302", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-3852", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3852", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-3854", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3854", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-3857", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3857", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-3859", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3859", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-3861", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3861", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-3863", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3863", + "Source": "CVE" + }, + { + "RefID": "CVE-2024-3864", + "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-3864", + "Source": "CVE" + } + ], + "Description": "This update upgrades firefox-esr to version 115.10.0-alt1. \nSecurity Fix(es):\n\n * BDU:2024-02338: Уязвимость браузера Mozilla Firefox, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю провести атаку типа clickjacking («захват клика»)\n\n * CVE-2024-2609: The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites. This vulnerability affects Firefox \u003c 124, Firefox ESR \u003c 115.10, and Thunderbird \u003c 115.10.\n\n * CVE-2024-3302: There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox \u003c 125 and Firefox ESR \u003c 115.10.\n\n * CVE-2024-3852: GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox \u003c 125, Firefox ESR \u003c 115.10, and Thunderbird \u003c 115.10.\n\n * CVE-2024-3854: In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox \u003c 125, Firefox ESR \u003c 115.10, and Thunderbird \u003c 115.10.\n\n * CVE-2024-3857: The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox \u003c 125, Firefox ESR \u003c 115.10, and Thunderbird \u003c 115.10.\n\n * CVE-2024-3859: On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox \u003c 125, Firefox ESR \u003c 115.10, and Thunderbird \u003c 115.10.\n\n * CVE-2024-3861: If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox \u003c 125, Firefox ESR \u003c 115.10, and Thunderbird \u003c 115.10.\n\n * CVE-2024-3863: The executable file warning was not presented when downloading .xrm-ms files. \n*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox \u003c 125, Firefox ESR \u003c 115.10, and Thunderbird \u003c 115.10.\n\n * CVE-2024-3864: Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 125 and Firefox ESR \u003c 115.10.", + "Advisory": { + "From": "errata.altlinux.org", + "Severity": "Low", + "Rights": "Copyright 2024 BaseALT Ltd.", + "Issued": { + "Date": "2024-04-23" + }, + "Updated": { + "Date": "2024-04-23" + }, + "BDUs": [ + { + "ID": "BDU:2024-02338", + "CVSS": "AV:N/AC:H/Au:N/C:N/I:C/A:N", + "CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "CWE": "CWE-450", + "Href": "https://bdu.fstec.ru/vul/2024-02338", + "Impact": "Low", + "Public": "20240319" + } + ], + "CVEs": [ + { + "ID": "CVE-2024-2609", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-2609", + "Impact": "None", + "Public": "20240319" + }, + { + "ID": "CVE-2024-3302", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3302", + "Impact": "None", + "Public": "20240416" + }, + { + "ID": "CVE-2024-3852", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3852", + "Impact": "None", + "Public": "20240416" + }, + { + "ID": "CVE-2024-3854", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3854", + "Impact": "None", + "Public": "20240416" + }, + { + "ID": "CVE-2024-3857", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3857", + "Impact": "None", + "Public": "20240416" + }, + { + "ID": "CVE-2024-3859", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3859", + "Impact": "None", + "Public": "20240416" + }, + { + "ID": "CVE-2024-3861", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3861", + "Impact": "None", + "Public": "20240416" + }, + { + "ID": "CVE-2024-3863", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3863", + "Impact": "None", + "Public": "20240416" + }, + { + "ID": "CVE-2024-3864", + "Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-3864", + "Impact": "None", + "Public": "20240416" + } + ], + "AffectedCPEs": { + "CPEs": [ + "cpe:/o:alt:kworkstation:10", + "cpe:/o:alt:workstation:10", + "cpe:/o:alt:server:10", + "cpe:/o:alt:server-v:10", + "cpe:/o:alt:education:10", + "cpe:/o:alt:slinux:10", + "cpe:/o:alt:starterkit:p10", + "cpe:/o:alt:kworkstation:10.1", + "cpe:/o:alt:workstation:10.1", + "cpe:/o:alt:server:10.1", + "cpe:/o:alt:server-v:10.1", + "cpe:/o:alt:education:10.1", + "cpe:/o:alt:slinux:10.1", + "cpe:/o:alt:starterkit:10.1", + "cpe:/o:alt:kworkstation:10.2", + "cpe:/o:alt:workstation:10.2", + "cpe:/o:alt:server:10.2", + "cpe:/o:alt:server-v:10.2", + "cpe:/o:alt:education:10.2", + "cpe:/o:alt:slinux:10.2", + "cpe:/o:alt:starterkit:10.2" + ] + } + } + }, + "Criteria": { + "Operator": "AND", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:2001", + "Comment": "ALT Linux must be installed" + } + ], + "Criterias": [ + { + "Operator": "OR", + "Criterions": [ + { + "TestRef": "oval:org.altlinux.errata:tst:20246721001", + "Comment": "firefox-esr is earlier than 0:115.10.0-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20246721002", + "Comment": "firefox-esr-config-privacy is earlier than 0:115.10.0-alt1" + }, + { + "TestRef": "oval:org.altlinux.errata:tst:20246721003", + "Comment": "firefox-esr-wayland is earlier than 0:115.10.0-alt1" + } + ] + } + ] + } + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-6721/objects.json b/oval/p10/ALT-PU-2024-6721/objects.json new file mode 100644 index 0000000000..52d1b3582e --- /dev/null +++ b/oval/p10/ALT-PU-2024-6721/objects.json @@ -0,0 +1,46 @@ +{ + "TextFileContent54Objects": [ + { + "ID": "oval:org.altlinux.errata:obj:2001", + "Version": "1", + "Comment": "Evaluate `/etc/os-release` file content", + "Path": { + "Datatype": "string", + "Text": "/etc" + }, + "Filepath": { + "Datatype": "string", + "Text": "os-release" + }, + "Pattern": { + "Datatype": "string", + "Operation": "pattern match", + "Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*" + }, + "Instance": { + "Datatype": "int", + "Text": "1" + } + } + ], + "RPMInfoObjects": [ + { + "ID": "oval:org.altlinux.errata:obj:20246721001", + "Version": "1", + "Comment": "firefox-esr is installed", + "Name": "firefox-esr" + }, + { + "ID": "oval:org.altlinux.errata:obj:20246721002", + "Version": "1", + "Comment": "firefox-esr-config-privacy is installed", + "Name": "firefox-esr-config-privacy" + }, + { + "ID": "oval:org.altlinux.errata:obj:20246721003", + "Version": "1", + "Comment": "firefox-esr-wayland is installed", + "Name": "firefox-esr-wayland" + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-6721/states.json b/oval/p10/ALT-PU-2024-6721/states.json new file mode 100644 index 0000000000..f6352e5ba2 --- /dev/null +++ b/oval/p10/ALT-PU-2024-6721/states.json @@ -0,0 +1,23 @@ +{ + "TextFileContent54State": [ + { + "ID": "oval:org.altlinux.errata:ste:2001", + "Version": "1", + "Text": {} + } + ], + "RPMInfoStates": [ + { + "ID": "oval:org.altlinux.errata:ste:20246721001", + "Version": "1", + "Comment": "package EVR is earlier than 0:115.10.0-alt1", + "Arch": {}, + "EVR": { + "Text": "0:115.10.0-alt1", + "Datatype": "evr_string", + "Operation": "less than" + }, + "Subexpression": {} + } + ] +} \ No newline at end of file diff --git a/oval/p10/ALT-PU-2024-6721/tests.json b/oval/p10/ALT-PU-2024-6721/tests.json new file mode 100644 index 0000000000..d507c628a4 --- /dev/null +++ b/oval/p10/ALT-PU-2024-6721/tests.json @@ -0,0 +1,54 @@ +{ + "TextFileContent54Tests": [ + { + "ID": "oval:org.altlinux.errata:tst:2001", + "Version": "1", + "Check": "all", + "Comment": "ALT Linux based on branch 'p10' must be installed", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:2001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:2001" + } + } + ], + "RPMInfoTests": [ + { + "ID": "oval:org.altlinux.errata:tst:20246721001", + "Version": "1", + "Check": "all", + "Comment": "firefox-esr is earlier than 0:115.10.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20246721001" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20246721001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20246721002", + "Version": "1", + "Check": "all", + "Comment": "firefox-esr-config-privacy is earlier than 0:115.10.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20246721002" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20246721001" + } + }, + { + "ID": "oval:org.altlinux.errata:tst:20246721003", + "Version": "1", + "Check": "all", + "Comment": "firefox-esr-wayland is earlier than 0:115.10.0-alt1", + "Object": { + "ObjectRef": "oval:org.altlinux.errata:obj:20246721003" + }, + "State": { + "StateRef": "oval:org.altlinux.errata:ste:20246721001" + } + } + ] +} \ No newline at end of file