ALT Vulnerability

This commit is contained in:
Иван Пепеляев 2024-10-17 03:04:55 +00:00
parent db9aa63606
commit cdcde0cb0b
24 changed files with 2014 additions and 0 deletions

View File

@ -0,0 +1,157 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202413944",
"Version": "oval:org.altlinux.errata:def:202413944",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-13944: package `unzip` update to version 6.0-alt6",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-13944",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13944",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-01692",
"RefURL": "https://bdu.fstec.ru/vul/2020-01692",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00293",
"RefURL": "https://bdu.fstec.ru/vul/2023-00293",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00295",
"RefURL": "https://bdu.fstec.ru/vul/2023-00295",
"Source": "BDU"
},
{
"RefID": "CVE-2019-13232",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13232",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0529",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0529",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0530",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0530",
"Source": "CVE"
}
],
"Description": "This update upgrades unzip to version 6.0-alt6. \nSecurity Fix(es):\n\n * BDU:2020-01692: Уязвимость файлового архиватора Info-ZIP Unzip, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00293: Уязвимость файлового архиватора UnZip, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00295: Уязвимость файлового архиватора UnZip, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-13232: Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a \"better zip bomb\" issue.\n\n * CVE-2022-0529: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.\n\n * CVE-2022-0530: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-10-16"
},
"Updated": {
"Date": "2024-10-16"
},
"BDUs": [
{
"ID": "BDU:2020-01692",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2020-01692",
"Impact": "High",
"Public": "20190704"
},
{
"ID": "BDU:2023-00293",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-00293",
"Impact": "Low",
"Public": "20220207"
},
{
"ID": "BDU:2023-00295",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2023-00295",
"Impact": "Low",
"Public": "20220228"
}
],
"CVEs": [
{
"ID": "CVE-2019-13232",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13232",
"Impact": "Low",
"Public": "20190704"
},
{
"ID": "CVE-2022-0529",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0529",
"Impact": "Low",
"Public": "20220209"
},
{
"ID": "CVE-2022-0530",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0530",
"Impact": "Low",
"Public": "20220209"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202413944001",
"Comment": "unzip is earlier than 0:6.0-alt6"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,34 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:4001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202413944001",
"Version": "1",
"Comment": "unzip is installed",
"Name": "unzip"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:4001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202413944001",
"Version": "1",
"Comment": "package EVR is earlier than 0:6.0-alt6",
"Arch": {},
"EVR": {
"Text": "0:6.0-alt6",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,30 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:4001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:4001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202413944001",
"Version": "1",
"Check": "all",
"Comment": "unzip is earlier than 0:6.0-alt6",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413944001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413944001"
}
}
]
}

View File

@ -0,0 +1,273 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202413962",
"Version": "oval:org.altlinux.errata:def:202413962",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-13962: package `wireshark` update to version 4.2.7-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-13962",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13962",
"Source": "ALTPU"
},
{
"RefID": "BDU:2024-00164",
"RefURL": "https://bdu.fstec.ru/vul/2024-00164",
"Source": "BDU"
},
{
"RefID": "BDU:2024-00215",
"RefURL": "https://bdu.fstec.ru/vul/2024-00215",
"Source": "BDU"
},
{
"RefID": "BDU:2024-02482",
"RefURL": "https://bdu.fstec.ru/vul/2024-02482",
"Source": "BDU"
},
{
"RefID": "BDU:2024-04117",
"RefURL": "https://bdu.fstec.ru/vul/2024-04117",
"Source": "BDU"
},
{
"RefID": "BDU:2024-04416",
"RefURL": "https://bdu.fstec.ru/vul/2024-04416",
"Source": "BDU"
},
{
"RefID": "BDU:2024-04417",
"RefURL": "https://bdu.fstec.ru/vul/2024-04417",
"Source": "BDU"
},
{
"RefID": "BDU:2024-06592",
"RefURL": "https://bdu.fstec.ru/vul/2024-06592",
"Source": "BDU"
},
{
"RefID": "CVE-2024-0208",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0208",
"Source": "CVE"
},
{
"RefID": "CVE-2024-0209",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0209",
"Source": "CVE"
},
{
"RefID": "CVE-2024-2955",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-2955",
"Source": "CVE"
},
{
"RefID": "CVE-2024-4853",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4853",
"Source": "CVE"
},
{
"RefID": "CVE-2024-4854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4854",
"Source": "CVE"
},
{
"RefID": "CVE-2024-4855",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4855",
"Source": "CVE"
},
{
"RefID": "CVE-2024-8250",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8250",
"Source": "CVE"
}
],
"Description": "This update upgrades wireshark to version 4.2.7-alt1. \nSecurity Fix(es):\n\n * BDU:2024-00164: Уязвимость диссектора GVCP анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00215: Уязвимость плагин-диссектора IEEE 1609.2 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-02482: Уязвимость диссектора T.38 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-04117: Уязвимость диссекторов MONGO и ZigBee TLV анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-04416: Уязвимость функции handle_chopping() анализатора трафика компьютерных сетей Wireshark, связанная с несовпадающией процедурой управления памятью, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-04417: Уязвимость функции wtap_dump_close() анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-06592: Уязвимость диссектора NTLMSSP анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2024-0208: GVCP dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file\n\n * CVE-2024-0209: IEEE 1609.2 dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file\n\n * CVE-2024-2955: T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file\n\n * CVE-2024-4853: Memory handling issue in editcap could cause denial of service via crafted capture file\n\n * CVE-2024-4854: MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file\n\n * CVE-2024-4855: Use after free issue in editcap could cause denial of service via crafted capture file\n\n * CVE-2024-8250: NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file\n\n * #50418: Некорректное отображение и изменение размеров окна wireshark при маленьких разрешениях",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-10-16"
},
"Updated": {
"Date": "2024-10-16"
},
"BDUs": [
{
"ID": "BDU:2024-00164",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2024-00164",
"Impact": "High",
"Public": "20240103"
},
{
"ID": "BDU:2024-00215",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2024-00215",
"Impact": "High",
"Public": "20240103"
},
{
"ID": "BDU:2024-02482",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-762",
"Href": "https://bdu.fstec.ru/vul/2024-02482",
"Impact": "High",
"Public": "20240327"
},
{
"ID": "BDU:2024-04117",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2024-04117",
"Impact": "Low",
"Public": "20240514"
},
{
"ID": "BDU:2024-04416",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-762",
"Href": "https://bdu.fstec.ru/vul/2024-04416",
"Impact": "Low",
"Public": "20240514"
},
{
"ID": "BDU:2024-04417",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2024-04417",
"Impact": "Low",
"Public": "20240514"
},
{
"ID": "BDU:2024-06592",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787, CWE-825",
"Href": "https://bdu.fstec.ru/vul/2024-06592",
"Impact": "High",
"Public": "20240722"
}
],
"CVEs": [
{
"ID": "CVE-2024-0208",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0208",
"Impact": "High",
"Public": "20240103"
},
{
"ID": "CVE-2024-0209",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0209",
"Impact": "High",
"Public": "20240103"
},
{
"ID": "CVE-2024-2955",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-2955",
"Impact": "None",
"Public": "20240326"
},
{
"ID": "CVE-2024-4853",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4853",
"Impact": "None",
"Public": "20240514"
},
{
"ID": "CVE-2024-4854",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4854",
"Impact": "None",
"Public": "20240514"
},
{
"ID": "CVE-2024-4855",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4855",
"Impact": "None",
"Public": "20240514"
},
{
"ID": "CVE-2024-8250",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8250",
"Impact": "Low",
"Public": "20240829"
}
],
"Bugzilla": [
{
"ID": "50418",
"Href": "https://bugzilla.altlinux.org/50418",
"Data": "Некорректное отображение и изменение размеров окна wireshark при маленьких разрешениях"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202413962001",
"Comment": "tshark is earlier than 0:4.2.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202413962002",
"Comment": "wireshark-base is earlier than 0:4.2.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202413962003",
"Comment": "wireshark-devel is earlier than 0:4.2.7-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202413962004",
"Comment": "wireshark-qt5 is earlier than 0:4.2.7-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,52 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:4001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202413962001",
"Version": "1",
"Comment": "tshark is installed",
"Name": "tshark"
},
{
"ID": "oval:org.altlinux.errata:obj:202413962002",
"Version": "1",
"Comment": "wireshark-base is installed",
"Name": "wireshark-base"
},
{
"ID": "oval:org.altlinux.errata:obj:202413962003",
"Version": "1",
"Comment": "wireshark-devel is installed",
"Name": "wireshark-devel"
},
{
"ID": "oval:org.altlinux.errata:obj:202413962004",
"Version": "1",
"Comment": "wireshark-qt5 is installed",
"Name": "wireshark-qt5"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:4001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202413962001",
"Version": "1",
"Comment": "package EVR is earlier than 0:4.2.7-alt1",
"Arch": {},
"EVR": {
"Text": "0:4.2.7-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,66 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:4001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:4001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202413962001",
"Version": "1",
"Check": "all",
"Comment": "tshark is earlier than 0:4.2.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413962001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413962001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413962002",
"Version": "1",
"Check": "all",
"Comment": "wireshark-base is earlier than 0:4.2.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413962002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413962001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413962003",
"Version": "1",
"Check": "all",
"Comment": "wireshark-devel is earlier than 0:4.2.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413962003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413962001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413962004",
"Version": "1",
"Check": "all",
"Comment": "wireshark-qt5 is earlier than 0:4.2.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413962004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413962001"
}
}
]
}

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,70 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:4001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202413971001",
"Version": "1",
"Comment": "golang is installed",
"Name": "golang"
},
{
"ID": "oval:org.altlinux.errata:obj:202413971002",
"Version": "1",
"Comment": "golang-docs is installed",
"Name": "golang-docs"
},
{
"ID": "oval:org.altlinux.errata:obj:202413971003",
"Version": "1",
"Comment": "golang-gdb is installed",
"Name": "golang-gdb"
},
{
"ID": "oval:org.altlinux.errata:obj:202413971004",
"Version": "1",
"Comment": "golang-misc is installed",
"Name": "golang-misc"
},
{
"ID": "oval:org.altlinux.errata:obj:202413971005",
"Version": "1",
"Comment": "golang-shared is installed",
"Name": "golang-shared"
},
{
"ID": "oval:org.altlinux.errata:obj:202413971006",
"Version": "1",
"Comment": "golang-src is installed",
"Name": "golang-src"
},
{
"ID": "oval:org.altlinux.errata:obj:202413971007",
"Version": "1",
"Comment": "golang-tests is installed",
"Name": "golang-tests"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:4001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202413971001",
"Version": "1",
"Comment": "package EVR is earlier than 0:1.22.7-alt1",
"Arch": {},
"EVR": {
"Text": "0:1.22.7-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,102 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:4001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:4001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202413971001",
"Version": "1",
"Check": "all",
"Comment": "golang is earlier than 0:1.22.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413971001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413971002",
"Version": "1",
"Check": "all",
"Comment": "golang-docs is earlier than 0:1.22.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413971002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413971003",
"Version": "1",
"Check": "all",
"Comment": "golang-gdb is earlier than 0:1.22.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413971003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413971004",
"Version": "1",
"Check": "all",
"Comment": "golang-misc is earlier than 0:1.22.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413971004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413971005",
"Version": "1",
"Check": "all",
"Comment": "golang-shared is earlier than 0:1.22.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413971005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413971006",
"Version": "1",
"Check": "all",
"Comment": "golang-src is earlier than 0:1.22.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413971006"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413971007",
"Version": "1",
"Check": "all",
"Comment": "golang-tests is earlier than 0:1.22.7-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413971007"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
}
}
]
}

View File

@ -0,0 +1,129 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202413889",
"Version": "oval:org.altlinux.errata:def:202413889",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-13889: package `dosbox` update to version 0.74.3-alt3",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-13889",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13889",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02904",
"RefURL": "https://bdu.fstec.ru/vul/2019-02904",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02905",
"RefURL": "https://bdu.fstec.ru/vul/2019-02905",
"Source": "BDU"
},
{
"RefID": "CVE-2019-12594",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12594",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7165",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7165",
"Source": "CVE"
}
],
"Description": "This update upgrades dosbox to version 0.74.3-alt3. \nSecurity Fix(es):\n\n * BDU:2019-02904: Уязвимость эмулятора DOSBox, связанная с недостатками контроля доступа, позволяющая нарушителю оказать воздействие на целостность данных, получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2019-02905: Уязвимость эмулятора DOSBox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность данных, получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * CVE-2019-12594: DOSBox 0.74-2 has Incorrect Access Control.\n\n * CVE-2019-7165: A buffer overflow in DOSBox 0.74-2 allows attackers to execute arbitrary code.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-10-16"
},
"Updated": {
"Date": "2024-10-16"
},
"BDUs": [
{
"ID": "BDU:2019-02904",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-02904",
"Impact": "Critical",
"Public": "20190609"
},
{
"ID": "BDU:2019-02905",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-02905",
"Impact": "Critical",
"Public": "20190609"
}
],
"CVEs": [
{
"ID": "CVE-2019-12594",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12594",
"Impact": "Critical",
"Public": "20190702"
},
{
"ID": "CVE-2019-7165",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7165",
"Impact": "Critical",
"Public": "20190703"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202413889001",
"Comment": "dosbox is earlier than 1:0.74.3-alt3"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,34 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:3001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d\\.\\d)"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202413889001",
"Version": "1",
"Comment": "dosbox is installed",
"Name": "dosbox"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:3001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202413889001",
"Version": "1",
"Comment": "package EVR is earlier than 1:0.74.3-alt3",
"Arch": {},
"EVR": {
"Text": "1:0.74.3-alt3",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,30 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:3001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'c9f2' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:3001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:3001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202413889001",
"Version": "1",
"Check": "all",
"Comment": "dosbox is earlier than 1:0.74.3-alt3",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413889001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413889001"
}
}
]
}

View File

@ -0,0 +1,119 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202413810",
"Version": "oval:org.altlinux.errata:def:202413810",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-13810: package `unbound` update to version 1.20.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-13810",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13810",
"Source": "ALTPU"
},
{
"RefID": "CVE-2024-8508",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8508",
"Source": "CVE"
}
],
"Description": "This update upgrades unbound to version 1.20.1-alt1. \nSecurity Fix(es):\n\n * CVE-2024-8508: NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-10-16"
},
"Updated": {
"Date": "2024-10-16"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2024-8508",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8508",
"Impact": "None",
"Public": "20241003"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202413810001",
"Comment": "libunbound is earlier than 0:1.20.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202413810002",
"Comment": "libunbound-devel is earlier than 0:1.20.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202413810003",
"Comment": "unbound is earlier than 0:1.20.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202413810004",
"Comment": "unbound-control is earlier than 0:1.20.1-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,52 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:2001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202413810001",
"Version": "1",
"Comment": "libunbound is installed",
"Name": "libunbound"
},
{
"ID": "oval:org.altlinux.errata:obj:202413810002",
"Version": "1",
"Comment": "libunbound-devel is installed",
"Name": "libunbound-devel"
},
{
"ID": "oval:org.altlinux.errata:obj:202413810003",
"Version": "1",
"Comment": "unbound is installed",
"Name": "unbound"
},
{
"ID": "oval:org.altlinux.errata:obj:202413810004",
"Version": "1",
"Comment": "unbound-control is installed",
"Name": "unbound-control"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:2001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202413810001",
"Version": "1",
"Comment": "package EVR is earlier than 0:1.20.1-alt1",
"Arch": {},
"EVR": {
"Text": "0:1.20.1-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,66 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:2001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'p10' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:2001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202413810001",
"Version": "1",
"Check": "all",
"Comment": "libunbound is earlier than 0:1.20.1-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413810001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413810001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413810002",
"Version": "1",
"Check": "all",
"Comment": "libunbound-devel is earlier than 0:1.20.1-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413810002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413810001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413810003",
"Version": "1",
"Check": "all",
"Comment": "unbound is earlier than 0:1.20.1-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413810003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413810001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202413810004",
"Version": "1",
"Check": "all",
"Comment": "unbound-control is earlier than 0:1.20.1-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202413810004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202413810001"
}
}
]
}

View File

@ -0,0 +1,121 @@
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202414103",
"Version": "oval:org.altlinux.errata:def:202414103",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-14103: package `alterator-auth` update to version 0.44.11-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-14103",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-14103",
"Source": "ALTPU"
}
],
"Description": "This update upgrades alterator-auth to version 0.44.11-alt1. \nSecurity Fix(es):\n\n * #51675: system-auth - На пробелах в OU падает, версию показать не может",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-10-16"
},
"Updated": {
"Date": "2024-10-16"
},
"BDUs": null,
"Bugzilla": [
{
"ID": "51675",
"Href": "https://bugzilla.altlinux.org/51675",
"Data": "system-auth - На пробелах в OU падает, версию показать не может"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202414103001",
"Comment": "alterator-auth is earlier than 0:0.44.11-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202414103002",
"Comment": "alterator-roles-common is earlier than 0:0.44.11-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202414103003",
"Comment": "task-auth-ad-sssd is earlier than 0:0.44.11-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202414103004",
"Comment": "task-auth-ad-winbind is earlier than 0:0.44.11-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202414103005",
"Comment": "task-auth-freeipa is earlier than 0:0.44.11-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202414103006",
"Comment": "task-auth-ldap-sssd is earlier than 0:0.44.11-alt1"
}
]
}
]
}
}
]
}

View File

@ -0,0 +1,64 @@
{
"TextFileContent54Objects": [
{
"ID": "oval:org.altlinux.errata:obj:2001",
"Version": "1",
"Comment": "Evaluate `/etc/os-release` file content",
"Path": {
"Datatype": "string",
"Text": "/etc"
},
"Filepath": {
"Datatype": "string",
"Text": "os-release"
},
"Pattern": {
"Datatype": "string",
"Operation": "pattern match",
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
},
"Instance": {
"Datatype": "int",
"Text": "1"
}
}
],
"RPMInfoObjects": [
{
"ID": "oval:org.altlinux.errata:obj:202414103001",
"Version": "1",
"Comment": "alterator-auth is installed",
"Name": "alterator-auth"
},
{
"ID": "oval:org.altlinux.errata:obj:202414103002",
"Version": "1",
"Comment": "alterator-roles-common is installed",
"Name": "alterator-roles-common"
},
{
"ID": "oval:org.altlinux.errata:obj:202414103003",
"Version": "1",
"Comment": "task-auth-ad-sssd is installed",
"Name": "task-auth-ad-sssd"
},
{
"ID": "oval:org.altlinux.errata:obj:202414103004",
"Version": "1",
"Comment": "task-auth-ad-winbind is installed",
"Name": "task-auth-ad-winbind"
},
{
"ID": "oval:org.altlinux.errata:obj:202414103005",
"Version": "1",
"Comment": "task-auth-freeipa is installed",
"Name": "task-auth-freeipa"
},
{
"ID": "oval:org.altlinux.errata:obj:202414103006",
"Version": "1",
"Comment": "task-auth-ldap-sssd is installed",
"Name": "task-auth-ldap-sssd"
}
]
}

View File

@ -0,0 +1,23 @@
{
"TextFileContent54State": [
{
"ID": "oval:org.altlinux.errata:ste:2001",
"Version": "1",
"Text": {}
}
],
"RPMInfoStates": [
{
"ID": "oval:org.altlinux.errata:ste:202414103001",
"Version": "1",
"Comment": "package EVR is earlier than 0:0.44.11-alt1",
"Arch": {},
"EVR": {
"Text": "0:0.44.11-alt1",
"Datatype": "evr_string",
"Operation": "less than"
},
"Subexpression": {}
}
]
}

View File

@ -0,0 +1,90 @@
{
"TextFileContent54Tests": [
{
"ID": "oval:org.altlinux.errata:tst:2001",
"Version": "1",
"Check": "all",
"Comment": "ALT Linux based on branch 'p10' must be installed",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:2001"
}
}
],
"RPMInfoTests": [
{
"ID": "oval:org.altlinux.errata:tst:202414103001",
"Version": "1",
"Check": "all",
"Comment": "alterator-auth is earlier than 0:0.44.11-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202414103001"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202414103002",
"Version": "1",
"Check": "all",
"Comment": "alterator-roles-common is earlier than 0:0.44.11-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202414103002"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202414103003",
"Version": "1",
"Check": "all",
"Comment": "task-auth-ad-sssd is earlier than 0:0.44.11-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202414103003"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202414103004",
"Version": "1",
"Check": "all",
"Comment": "task-auth-ad-winbind is earlier than 0:0.44.11-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202414103004"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202414103005",
"Version": "1",
"Check": "all",
"Comment": "task-auth-freeipa is earlier than 0:0.44.11-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202414103005"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
}
},
{
"ID": "oval:org.altlinux.errata:tst:202414103006",
"Version": "1",
"Check": "all",
"Comment": "task-auth-ldap-sssd is earlier than 0:0.44.11-alt1",
"Object": {
"ObjectRef": "oval:org.altlinux.errata:obj:202414103006"
},
"State": {
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
}
}
]
}