ALT Vulnerability
This commit is contained in:
parent
db9aa63606
commit
cdcde0cb0b
157
oval/c10f1/ALT-PU-2024-13944/definitions.json
Normal file
157
oval/c10f1/ALT-PU-2024-13944/definitions.json
Normal file
@ -0,0 +1,157 @@
|
||||
{
|
||||
"Definition": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:def:202413944",
|
||||
"Version": "oval:org.altlinux.errata:def:202413944",
|
||||
"Class": "patch",
|
||||
"Metadata": {
|
||||
"Title": "ALT-PU-2024-13944: package `unzip` update to version 6.0-alt6",
|
||||
"AffectedList": [
|
||||
{
|
||||
"Family": "unix",
|
||||
"Platforms": [
|
||||
"ALT Linux branch c10f1"
|
||||
],
|
||||
"Products": [
|
||||
"ALT SP Workstation",
|
||||
"ALT SP Server"
|
||||
]
|
||||
}
|
||||
],
|
||||
"References": [
|
||||
{
|
||||
"RefID": "ALT-PU-2024-13944",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13944",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2020-01692",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2020-01692",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2023-00293",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2023-00293",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2023-00295",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2023-00295",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2019-13232",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13232",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2022-0529",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0529",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2022-0530",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0530",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades unzip to version 6.0-alt6. \nSecurity Fix(es):\n\n * BDU:2020-01692: Уязвимость файлового архиватора Info-ZIP Unzip, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00293: Уязвимость файлового архиватора UnZip, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00295: Уязвимость файлового архиватора UnZip, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-13232: Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a \"better zip bomb\" issue.\n\n * CVE-2022-0529: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.\n\n * CVE-2022-0530: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "High",
|
||||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||||
"Issued": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"BDUs": [
|
||||
{
|
||||
"ID": "BDU:2020-01692",
|
||||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-400",
|
||||
"Href": "https://bdu.fstec.ru/vul/2020-01692",
|
||||
"Impact": "High",
|
||||
"Public": "20190704"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2023-00293",
|
||||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-787",
|
||||
"Href": "https://bdu.fstec.ru/vul/2023-00293",
|
||||
"Impact": "Low",
|
||||
"Public": "20220207"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2023-00295",
|
||||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-119",
|
||||
"Href": "https://bdu.fstec.ru/vul/2023-00295",
|
||||
"Impact": "Low",
|
||||
"Public": "20220228"
|
||||
}
|
||||
],
|
||||
"CVEs": [
|
||||
{
|
||||
"ID": "CVE-2019-13232",
|
||||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
|
||||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"CWE": "CWE-400",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13232",
|
||||
"Impact": "Low",
|
||||
"Public": "20190704"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2022-0529",
|
||||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-787",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0529",
|
||||
"Impact": "Low",
|
||||
"Public": "20220209"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2022-0530",
|
||||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"CWE": "NVD-CWE-Other",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0530",
|
||||
"Impact": "Low",
|
||||
"Public": "20220209"
|
||||
}
|
||||
],
|
||||
"AffectedCPEs": {
|
||||
"CPEs": [
|
||||
"cpe:/o:alt:spworkstation:10",
|
||||
"cpe:/o:alt:spserver:10"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Criteria": {
|
||||
"Operator": "AND",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||||
"Comment": "ALT Linux must be installed"
|
||||
}
|
||||
],
|
||||
"Criterias": [
|
||||
{
|
||||
"Operator": "OR",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413944001",
|
||||
"Comment": "unzip is earlier than 0:6.0-alt6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
34
oval/c10f1/ALT-PU-2024-13944/objects.json
Normal file
34
oval/c10f1/ALT-PU-2024-13944/objects.json
Normal file
@ -0,0 +1,34 @@
|
||||
{
|
||||
"TextFileContent54Objects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:4001",
|
||||
"Version": "1",
|
||||
"Comment": "Evaluate `/etc/os-release` file content",
|
||||
"Path": {
|
||||
"Datatype": "string",
|
||||
"Text": "/etc"
|
||||
},
|
||||
"Filepath": {
|
||||
"Datatype": "string",
|
||||
"Text": "os-release"
|
||||
},
|
||||
"Pattern": {
|
||||
"Datatype": "string",
|
||||
"Operation": "pattern match",
|
||||
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
|
||||
},
|
||||
"Instance": {
|
||||
"Datatype": "int",
|
||||
"Text": "1"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoObjects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413944001",
|
||||
"Version": "1",
|
||||
"Comment": "unzip is installed",
|
||||
"Name": "unzip"
|
||||
}
|
||||
]
|
||||
}
|
23
oval/c10f1/ALT-PU-2024-13944/states.json
Normal file
23
oval/c10f1/ALT-PU-2024-13944/states.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"TextFileContent54State": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:4001",
|
||||
"Version": "1",
|
||||
"Text": {}
|
||||
}
|
||||
],
|
||||
"RPMInfoStates": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:202413944001",
|
||||
"Version": "1",
|
||||
"Comment": "package EVR is earlier than 0:6.0-alt6",
|
||||
"Arch": {},
|
||||
"EVR": {
|
||||
"Text": "0:6.0-alt6",
|
||||
"Datatype": "evr_string",
|
||||
"Operation": "less than"
|
||||
},
|
||||
"Subexpression": {}
|
||||
}
|
||||
]
|
||||
}
|
30
oval/c10f1/ALT-PU-2024-13944/tests.json
Normal file
30
oval/c10f1/ALT-PU-2024-13944/tests.json
Normal file
@ -0,0 +1,30 @@
|
||||
{
|
||||
"TextFileContent54Tests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:4001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:4001"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoTests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413944001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "unzip is earlier than 0:6.0-alt6",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413944001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413944001"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
273
oval/c10f1/ALT-PU-2024-13962/definitions.json
Normal file
273
oval/c10f1/ALT-PU-2024-13962/definitions.json
Normal file
@ -0,0 +1,273 @@
|
||||
{
|
||||
"Definition": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:def:202413962",
|
||||
"Version": "oval:org.altlinux.errata:def:202413962",
|
||||
"Class": "patch",
|
||||
"Metadata": {
|
||||
"Title": "ALT-PU-2024-13962: package `wireshark` update to version 4.2.7-alt1",
|
||||
"AffectedList": [
|
||||
{
|
||||
"Family": "unix",
|
||||
"Platforms": [
|
||||
"ALT Linux branch c10f1"
|
||||
],
|
||||
"Products": [
|
||||
"ALT SP Workstation",
|
||||
"ALT SP Server"
|
||||
]
|
||||
}
|
||||
],
|
||||
"References": [
|
||||
{
|
||||
"RefID": "ALT-PU-2024-13962",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13962",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2024-00164",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2024-00164",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2024-00215",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2024-00215",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2024-02482",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2024-02482",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2024-04117",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2024-04117",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2024-04416",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2024-04416",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2024-04417",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2024-04417",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2024-06592",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2024-06592",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-0208",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0208",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-0209",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-0209",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-2955",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-2955",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-4853",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4853",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-4854",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4854",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-4855",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-4855",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-8250",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8250",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades wireshark to version 4.2.7-alt1. \nSecurity Fix(es):\n\n * BDU:2024-00164: Уязвимость диссектора GVCP анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00215: Уязвимость плагин-диссектора IEEE 1609.2 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-02482: Уязвимость диссектора T.38 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-04117: Уязвимость диссекторов MONGO и ZigBee TLV анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-04416: Уязвимость функции handle_chopping() анализатора трафика компьютерных сетей Wireshark, связанная с несовпадающией процедурой управления памятью, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-04417: Уязвимость функции wtap_dump_close() анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-06592: Уязвимость диссектора NTLMSSP анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2024-0208: GVCP dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file\n\n * CVE-2024-0209: IEEE 1609.2 dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file\n\n * CVE-2024-2955: T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of service via packet injection or crafted capture file\n\n * CVE-2024-4853: Memory handling issue in editcap could cause denial of service via crafted capture file\n\n * CVE-2024-4854: MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file\n\n * CVE-2024-4855: Use after free issue in editcap could cause denial of service via crafted capture file\n\n * CVE-2024-8250: NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file\n\n * #50418: Некорректное отображение и изменение размеров окна wireshark при маленьких разрешениях",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "High",
|
||||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||||
"Issued": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"BDUs": [
|
||||
{
|
||||
"ID": "BDU:2024-00164",
|
||||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-20",
|
||||
"Href": "https://bdu.fstec.ru/vul/2024-00164",
|
||||
"Impact": "High",
|
||||
"Public": "20240103"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2024-00215",
|
||||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-476",
|
||||
"Href": "https://bdu.fstec.ru/vul/2024-00215",
|
||||
"Impact": "High",
|
||||
"Public": "20240103"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2024-02482",
|
||||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"CWE": "CWE-762",
|
||||
"Href": "https://bdu.fstec.ru/vul/2024-02482",
|
||||
"Impact": "High",
|
||||
"Public": "20240327"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2024-04117",
|
||||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:C",
|
||||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
|
||||
"CWE": "CWE-835",
|
||||
"Href": "https://bdu.fstec.ru/vul/2024-04117",
|
||||
"Impact": "Low",
|
||||
"Public": "20240514"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2024-04416",
|
||||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-762",
|
||||
"Href": "https://bdu.fstec.ru/vul/2024-04416",
|
||||
"Impact": "Low",
|
||||
"Public": "20240514"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2024-04417",
|
||||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:P",
|
||||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"CWE": "CWE-416",
|
||||
"Href": "https://bdu.fstec.ru/vul/2024-04417",
|
||||
"Impact": "Low",
|
||||
"Public": "20240514"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2024-06592",
|
||||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"CWE": "CWE-787, CWE-825",
|
||||
"Href": "https://bdu.fstec.ru/vul/2024-06592",
|
||||
"Impact": "High",
|
||||
"Public": "20240722"
|
||||
}
|
||||
],
|
||||
"CVEs": [
|
||||
{
|
||||
"ID": "CVE-2024-0208",
|
||||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"CWE": "NVD-CWE-Other",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0208",
|
||||
"Impact": "High",
|
||||
"Public": "20240103"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2024-0209",
|
||||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-476",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-0209",
|
||||
"Impact": "High",
|
||||
"Public": "20240103"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2024-2955",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-2955",
|
||||
"Impact": "None",
|
||||
"Public": "20240326"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2024-4853",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4853",
|
||||
"Impact": "None",
|
||||
"Public": "20240514"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2024-4854",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4854",
|
||||
"Impact": "None",
|
||||
"Public": "20240514"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2024-4855",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-4855",
|
||||
"Impact": "None",
|
||||
"Public": "20240514"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2024-8250",
|
||||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"CWE": "CWE-787",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8250",
|
||||
"Impact": "Low",
|
||||
"Public": "20240829"
|
||||
}
|
||||
],
|
||||
"Bugzilla": [
|
||||
{
|
||||
"ID": "50418",
|
||||
"Href": "https://bugzilla.altlinux.org/50418",
|
||||
"Data": "Некорректное отображение и изменение размеров окна wireshark при маленьких разрешениях"
|
||||
}
|
||||
],
|
||||
"AffectedCPEs": {
|
||||
"CPEs": [
|
||||
"cpe:/o:alt:spworkstation:10",
|
||||
"cpe:/o:alt:spserver:10"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Criteria": {
|
||||
"Operator": "AND",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||||
"Comment": "ALT Linux must be installed"
|
||||
}
|
||||
],
|
||||
"Criterias": [
|
||||
{
|
||||
"Operator": "OR",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413962001",
|
||||
"Comment": "tshark is earlier than 0:4.2.7-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413962002",
|
||||
"Comment": "wireshark-base is earlier than 0:4.2.7-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413962003",
|
||||
"Comment": "wireshark-devel is earlier than 0:4.2.7-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413962004",
|
||||
"Comment": "wireshark-qt5 is earlier than 0:4.2.7-alt1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
52
oval/c10f1/ALT-PU-2024-13962/objects.json
Normal file
52
oval/c10f1/ALT-PU-2024-13962/objects.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"TextFileContent54Objects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:4001",
|
||||
"Version": "1",
|
||||
"Comment": "Evaluate `/etc/os-release` file content",
|
||||
"Path": {
|
||||
"Datatype": "string",
|
||||
"Text": "/etc"
|
||||
},
|
||||
"Filepath": {
|
||||
"Datatype": "string",
|
||||
"Text": "os-release"
|
||||
},
|
||||
"Pattern": {
|
||||
"Datatype": "string",
|
||||
"Operation": "pattern match",
|
||||
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
|
||||
},
|
||||
"Instance": {
|
||||
"Datatype": "int",
|
||||
"Text": "1"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoObjects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413962001",
|
||||
"Version": "1",
|
||||
"Comment": "tshark is installed",
|
||||
"Name": "tshark"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413962002",
|
||||
"Version": "1",
|
||||
"Comment": "wireshark-base is installed",
|
||||
"Name": "wireshark-base"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413962003",
|
||||
"Version": "1",
|
||||
"Comment": "wireshark-devel is installed",
|
||||
"Name": "wireshark-devel"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413962004",
|
||||
"Version": "1",
|
||||
"Comment": "wireshark-qt5 is installed",
|
||||
"Name": "wireshark-qt5"
|
||||
}
|
||||
]
|
||||
}
|
23
oval/c10f1/ALT-PU-2024-13962/states.json
Normal file
23
oval/c10f1/ALT-PU-2024-13962/states.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"TextFileContent54State": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:4001",
|
||||
"Version": "1",
|
||||
"Text": {}
|
||||
}
|
||||
],
|
||||
"RPMInfoStates": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:202413962001",
|
||||
"Version": "1",
|
||||
"Comment": "package EVR is earlier than 0:4.2.7-alt1",
|
||||
"Arch": {},
|
||||
"EVR": {
|
||||
"Text": "0:4.2.7-alt1",
|
||||
"Datatype": "evr_string",
|
||||
"Operation": "less than"
|
||||
},
|
||||
"Subexpression": {}
|
||||
}
|
||||
]
|
||||
}
|
66
oval/c10f1/ALT-PU-2024-13962/tests.json
Normal file
66
oval/c10f1/ALT-PU-2024-13962/tests.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"TextFileContent54Tests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:4001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:4001"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoTests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413962001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "tshark is earlier than 0:4.2.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413962001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413962001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413962002",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "wireshark-base is earlier than 0:4.2.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413962002"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413962001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413962003",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "wireshark-devel is earlier than 0:4.2.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413962003"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413962001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413962004",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "wireshark-qt5 is earlier than 0:4.2.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413962004"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413962001"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
387
oval/c10f1/ALT-PU-2024-13971/definitions.json
Normal file
387
oval/c10f1/ALT-PU-2024-13971/definitions.json
Normal file
File diff suppressed because one or more lines are too long
70
oval/c10f1/ALT-PU-2024-13971/objects.json
Normal file
70
oval/c10f1/ALT-PU-2024-13971/objects.json
Normal file
@ -0,0 +1,70 @@
|
||||
{
|
||||
"TextFileContent54Objects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:4001",
|
||||
"Version": "1",
|
||||
"Comment": "Evaluate `/etc/os-release` file content",
|
||||
"Path": {
|
||||
"Datatype": "string",
|
||||
"Text": "/etc"
|
||||
},
|
||||
"Filepath": {
|
||||
"Datatype": "string",
|
||||
"Text": "os-release"
|
||||
},
|
||||
"Pattern": {
|
||||
"Datatype": "string",
|
||||
"Operation": "pattern match",
|
||||
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d+)"
|
||||
},
|
||||
"Instance": {
|
||||
"Datatype": "int",
|
||||
"Text": "1"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoObjects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413971001",
|
||||
"Version": "1",
|
||||
"Comment": "golang is installed",
|
||||
"Name": "golang"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413971002",
|
||||
"Version": "1",
|
||||
"Comment": "golang-docs is installed",
|
||||
"Name": "golang-docs"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413971003",
|
||||
"Version": "1",
|
||||
"Comment": "golang-gdb is installed",
|
||||
"Name": "golang-gdb"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413971004",
|
||||
"Version": "1",
|
||||
"Comment": "golang-misc is installed",
|
||||
"Name": "golang-misc"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413971005",
|
||||
"Version": "1",
|
||||
"Comment": "golang-shared is installed",
|
||||
"Name": "golang-shared"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413971006",
|
||||
"Version": "1",
|
||||
"Comment": "golang-src is installed",
|
||||
"Name": "golang-src"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413971007",
|
||||
"Version": "1",
|
||||
"Comment": "golang-tests is installed",
|
||||
"Name": "golang-tests"
|
||||
}
|
||||
]
|
||||
}
|
23
oval/c10f1/ALT-PU-2024-13971/states.json
Normal file
23
oval/c10f1/ALT-PU-2024-13971/states.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"TextFileContent54State": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:4001",
|
||||
"Version": "1",
|
||||
"Text": {}
|
||||
}
|
||||
],
|
||||
"RPMInfoStates": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:202413971001",
|
||||
"Version": "1",
|
||||
"Comment": "package EVR is earlier than 0:1.22.7-alt1",
|
||||
"Arch": {},
|
||||
"EVR": {
|
||||
"Text": "0:1.22.7-alt1",
|
||||
"Datatype": "evr_string",
|
||||
"Operation": "less than"
|
||||
},
|
||||
"Subexpression": {}
|
||||
}
|
||||
]
|
||||
}
|
102
oval/c10f1/ALT-PU-2024-13971/tests.json
Normal file
102
oval/c10f1/ALT-PU-2024-13971/tests.json
Normal file
@ -0,0 +1,102 @@
|
||||
{
|
||||
"TextFileContent54Tests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:4001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "ALT Linux based on branch 'c10f1' must be installed",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:4001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:4001"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoTests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413971001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "golang is earlier than 0:1.22.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413971001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413971002",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "golang-docs is earlier than 0:1.22.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413971002"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413971003",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "golang-gdb is earlier than 0:1.22.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413971003"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413971004",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "golang-misc is earlier than 0:1.22.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413971004"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413971005",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "golang-shared is earlier than 0:1.22.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413971005"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413971006",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "golang-src is earlier than 0:1.22.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413971006"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413971007",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "golang-tests is earlier than 0:1.22.7-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413971007"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413971001"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
129
oval/c9f2/ALT-PU-2024-13889/definitions.json
Normal file
129
oval/c9f2/ALT-PU-2024-13889/definitions.json
Normal file
@ -0,0 +1,129 @@
|
||||
{
|
||||
"Definition": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:def:202413889",
|
||||
"Version": "oval:org.altlinux.errata:def:202413889",
|
||||
"Class": "patch",
|
||||
"Metadata": {
|
||||
"Title": "ALT-PU-2024-13889: package `dosbox` update to version 0.74.3-alt3",
|
||||
"AffectedList": [
|
||||
{
|
||||
"Family": "unix",
|
||||
"Platforms": [
|
||||
"ALT Linux branch c9f2"
|
||||
],
|
||||
"Products": [
|
||||
"ALT SPWorkstation",
|
||||
"ALT SPServer"
|
||||
]
|
||||
}
|
||||
],
|
||||
"References": [
|
||||
{
|
||||
"RefID": "ALT-PU-2024-13889",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13889",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2019-02904",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2019-02904",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "BDU:2019-02905",
|
||||
"RefURL": "https://bdu.fstec.ru/vul/2019-02905",
|
||||
"Source": "BDU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2019-12594",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12594",
|
||||
"Source": "CVE"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2019-7165",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7165",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades dosbox to version 0.74.3-alt3. \nSecurity Fix(es):\n\n * BDU:2019-02904: Уязвимость эмулятора DOSBox, связанная с недостатками контроля доступа, позволяющая нарушителю оказать воздействие на целостность данных, получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2019-02905: Уязвимость эмулятора DOSBox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность данных, получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * CVE-2019-12594: DOSBox 0.74-2 has Incorrect Access Control.\n\n * CVE-2019-7165: A buffer overflow in DOSBox 0.74-2 allows attackers to execute arbitrary code.",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "Critical",
|
||||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||||
"Issued": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"BDUs": [
|
||||
{
|
||||
"ID": "BDU:2019-02904",
|
||||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"CWE": "CWE-284",
|
||||
"Href": "https://bdu.fstec.ru/vul/2019-02904",
|
||||
"Impact": "Critical",
|
||||
"Public": "20190609"
|
||||
},
|
||||
{
|
||||
"ID": "BDU:2019-02905",
|
||||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"CWE": "CWE-119",
|
||||
"Href": "https://bdu.fstec.ru/vul/2019-02905",
|
||||
"Impact": "Critical",
|
||||
"Public": "20190609"
|
||||
}
|
||||
],
|
||||
"CVEs": [
|
||||
{
|
||||
"ID": "CVE-2019-12594",
|
||||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"CWE": "NVD-CWE-noinfo",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12594",
|
||||
"Impact": "Critical",
|
||||
"Public": "20190702"
|
||||
},
|
||||
{
|
||||
"ID": "CVE-2019-7165",
|
||||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"CWE": "CWE-119",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7165",
|
||||
"Impact": "Critical",
|
||||
"Public": "20190703"
|
||||
}
|
||||
],
|
||||
"AffectedCPEs": {
|
||||
"CPEs": [
|
||||
"cpe:/o:alt:spworkstation:8.4",
|
||||
"cpe:/o:alt:spserver:8.4"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Criteria": {
|
||||
"Operator": "AND",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||||
"Comment": "ALT Linux must be installed"
|
||||
}
|
||||
],
|
||||
"Criterias": [
|
||||
{
|
||||
"Operator": "OR",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413889001",
|
||||
"Comment": "dosbox is earlier than 1:0.74.3-alt3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
34
oval/c9f2/ALT-PU-2024-13889/objects.json
Normal file
34
oval/c9f2/ALT-PU-2024-13889/objects.json
Normal file
@ -0,0 +1,34 @@
|
||||
{
|
||||
"TextFileContent54Objects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:3001",
|
||||
"Version": "1",
|
||||
"Comment": "Evaluate `/etc/os-release` file content",
|
||||
"Path": {
|
||||
"Datatype": "string",
|
||||
"Text": "/etc"
|
||||
},
|
||||
"Filepath": {
|
||||
"Datatype": "string",
|
||||
"Text": "os-release"
|
||||
},
|
||||
"Pattern": {
|
||||
"Datatype": "string",
|
||||
"Operation": "pattern match",
|
||||
"Text": "cpe:\\/o:alt:sp(?:server|workstation):(\\d\\.\\d)"
|
||||
},
|
||||
"Instance": {
|
||||
"Datatype": "int",
|
||||
"Text": "1"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoObjects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413889001",
|
||||
"Version": "1",
|
||||
"Comment": "dosbox is installed",
|
||||
"Name": "dosbox"
|
||||
}
|
||||
]
|
||||
}
|
23
oval/c9f2/ALT-PU-2024-13889/states.json
Normal file
23
oval/c9f2/ALT-PU-2024-13889/states.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"TextFileContent54State": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:3001",
|
||||
"Version": "1",
|
||||
"Text": {}
|
||||
}
|
||||
],
|
||||
"RPMInfoStates": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:202413889001",
|
||||
"Version": "1",
|
||||
"Comment": "package EVR is earlier than 1:0.74.3-alt3",
|
||||
"Arch": {},
|
||||
"EVR": {
|
||||
"Text": "1:0.74.3-alt3",
|
||||
"Datatype": "evr_string",
|
||||
"Operation": "less than"
|
||||
},
|
||||
"Subexpression": {}
|
||||
}
|
||||
]
|
||||
}
|
30
oval/c9f2/ALT-PU-2024-13889/tests.json
Normal file
30
oval/c9f2/ALT-PU-2024-13889/tests.json
Normal file
@ -0,0 +1,30 @@
|
||||
{
|
||||
"TextFileContent54Tests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:3001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "ALT Linux based on branch 'c9f2' must be installed",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:3001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:3001"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoTests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413889001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "dosbox is earlier than 1:0.74.3-alt3",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413889001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413889001"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
119
oval/p10/ALT-PU-2024-13810/definitions.json
Normal file
119
oval/p10/ALT-PU-2024-13810/definitions.json
Normal file
@ -0,0 +1,119 @@
|
||||
{
|
||||
"Definition": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:def:202413810",
|
||||
"Version": "oval:org.altlinux.errata:def:202413810",
|
||||
"Class": "patch",
|
||||
"Metadata": {
|
||||
"Title": "ALT-PU-2024-13810: package `unbound` update to version 1.20.1-alt1",
|
||||
"AffectedList": [
|
||||
{
|
||||
"Family": "unix",
|
||||
"Platforms": [
|
||||
"ALT Linux branch p10"
|
||||
],
|
||||
"Products": [
|
||||
"ALT Server",
|
||||
"ALT Virtualization Server",
|
||||
"ALT Workstation",
|
||||
"ALT Workstation K",
|
||||
"ALT Education",
|
||||
"Simply Linux",
|
||||
"Starterkit"
|
||||
]
|
||||
}
|
||||
],
|
||||
"References": [
|
||||
{
|
||||
"RefID": "ALT-PU-2024-13810",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13810",
|
||||
"Source": "ALTPU"
|
||||
},
|
||||
{
|
||||
"RefID": "CVE-2024-8508",
|
||||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-8508",
|
||||
"Source": "CVE"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades unbound to version 1.20.1-alt1. \nSecurity Fix(es):\n\n * CVE-2024-8508: NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "Low",
|
||||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||||
"Issued": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"BDUs": null,
|
||||
"CVEs": [
|
||||
{
|
||||
"ID": "CVE-2024-8508",
|
||||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-8508",
|
||||
"Impact": "None",
|
||||
"Public": "20241003"
|
||||
}
|
||||
],
|
||||
"AffectedCPEs": {
|
||||
"CPEs": [
|
||||
"cpe:/o:alt:kworkstation:10",
|
||||
"cpe:/o:alt:workstation:10",
|
||||
"cpe:/o:alt:server:10",
|
||||
"cpe:/o:alt:server-v:10",
|
||||
"cpe:/o:alt:education:10",
|
||||
"cpe:/o:alt:slinux:10",
|
||||
"cpe:/o:alt:starterkit:p10",
|
||||
"cpe:/o:alt:kworkstation:10.1",
|
||||
"cpe:/o:alt:workstation:10.1",
|
||||
"cpe:/o:alt:server:10.1",
|
||||
"cpe:/o:alt:server-v:10.1",
|
||||
"cpe:/o:alt:education:10.1",
|
||||
"cpe:/o:alt:slinux:10.1",
|
||||
"cpe:/o:alt:starterkit:10.1",
|
||||
"cpe:/o:alt:kworkstation:10.2",
|
||||
"cpe:/o:alt:workstation:10.2",
|
||||
"cpe:/o:alt:server:10.2",
|
||||
"cpe:/o:alt:server-v:10.2",
|
||||
"cpe:/o:alt:education:10.2",
|
||||
"cpe:/o:alt:slinux:10.2",
|
||||
"cpe:/o:alt:starterkit:10.2"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Criteria": {
|
||||
"Operator": "AND",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||||
"Comment": "ALT Linux must be installed"
|
||||
}
|
||||
],
|
||||
"Criterias": [
|
||||
{
|
||||
"Operator": "OR",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413810001",
|
||||
"Comment": "libunbound is earlier than 0:1.20.1-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413810002",
|
||||
"Comment": "libunbound-devel is earlier than 0:1.20.1-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413810003",
|
||||
"Comment": "unbound is earlier than 0:1.20.1-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202413810004",
|
||||
"Comment": "unbound-control is earlier than 0:1.20.1-alt1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
52
oval/p10/ALT-PU-2024-13810/objects.json
Normal file
52
oval/p10/ALT-PU-2024-13810/objects.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"TextFileContent54Objects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:2001",
|
||||
"Version": "1",
|
||||
"Comment": "Evaluate `/etc/os-release` file content",
|
||||
"Path": {
|
||||
"Datatype": "string",
|
||||
"Text": "/etc"
|
||||
},
|
||||
"Filepath": {
|
||||
"Datatype": "string",
|
||||
"Text": "os-release"
|
||||
},
|
||||
"Pattern": {
|
||||
"Datatype": "string",
|
||||
"Operation": "pattern match",
|
||||
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
|
||||
},
|
||||
"Instance": {
|
||||
"Datatype": "int",
|
||||
"Text": "1"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoObjects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413810001",
|
||||
"Version": "1",
|
||||
"Comment": "libunbound is installed",
|
||||
"Name": "libunbound"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413810002",
|
||||
"Version": "1",
|
||||
"Comment": "libunbound-devel is installed",
|
||||
"Name": "libunbound-devel"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413810003",
|
||||
"Version": "1",
|
||||
"Comment": "unbound is installed",
|
||||
"Name": "unbound"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202413810004",
|
||||
"Version": "1",
|
||||
"Comment": "unbound-control is installed",
|
||||
"Name": "unbound-control"
|
||||
}
|
||||
]
|
||||
}
|
23
oval/p10/ALT-PU-2024-13810/states.json
Normal file
23
oval/p10/ALT-PU-2024-13810/states.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"TextFileContent54State": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:2001",
|
||||
"Version": "1",
|
||||
"Text": {}
|
||||
}
|
||||
],
|
||||
"RPMInfoStates": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:202413810001",
|
||||
"Version": "1",
|
||||
"Comment": "package EVR is earlier than 0:1.20.1-alt1",
|
||||
"Arch": {},
|
||||
"EVR": {
|
||||
"Text": "0:1.20.1-alt1",
|
||||
"Datatype": "evr_string",
|
||||
"Operation": "less than"
|
||||
},
|
||||
"Subexpression": {}
|
||||
}
|
||||
]
|
||||
}
|
66
oval/p10/ALT-PU-2024-13810/tests.json
Normal file
66
oval/p10/ALT-PU-2024-13810/tests.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"TextFileContent54Tests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:2001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "ALT Linux based on branch 'p10' must be installed",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:2001"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoTests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413810001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "libunbound is earlier than 0:1.20.1-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413810001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413810001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413810002",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "libunbound-devel is earlier than 0:1.20.1-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413810002"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413810001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413810003",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "unbound is earlier than 0:1.20.1-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413810003"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413810001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202413810004",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "unbound-control is earlier than 0:1.20.1-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202413810004"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202413810001"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
121
oval/p10/ALT-PU-2024-14103/definitions.json
Normal file
121
oval/p10/ALT-PU-2024-14103/definitions.json
Normal file
@ -0,0 +1,121 @@
|
||||
{
|
||||
"Definition": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:def:202414103",
|
||||
"Version": "oval:org.altlinux.errata:def:202414103",
|
||||
"Class": "patch",
|
||||
"Metadata": {
|
||||
"Title": "ALT-PU-2024-14103: package `alterator-auth` update to version 0.44.11-alt1",
|
||||
"AffectedList": [
|
||||
{
|
||||
"Family": "unix",
|
||||
"Platforms": [
|
||||
"ALT Linux branch p10"
|
||||
],
|
||||
"Products": [
|
||||
"ALT Server",
|
||||
"ALT Virtualization Server",
|
||||
"ALT Workstation",
|
||||
"ALT Workstation K",
|
||||
"ALT Education",
|
||||
"Simply Linux",
|
||||
"Starterkit"
|
||||
]
|
||||
}
|
||||
],
|
||||
"References": [
|
||||
{
|
||||
"RefID": "ALT-PU-2024-14103",
|
||||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-14103",
|
||||
"Source": "ALTPU"
|
||||
}
|
||||
],
|
||||
"Description": "This update upgrades alterator-auth to version 0.44.11-alt1. \nSecurity Fix(es):\n\n * #51675: system-auth - На пробелах в OU падает, версию показать не может",
|
||||
"Advisory": {
|
||||
"From": "errata.altlinux.org",
|
||||
"Severity": "Low",
|
||||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||||
"Issued": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"Updated": {
|
||||
"Date": "2024-10-16"
|
||||
},
|
||||
"BDUs": null,
|
||||
"Bugzilla": [
|
||||
{
|
||||
"ID": "51675",
|
||||
"Href": "https://bugzilla.altlinux.org/51675",
|
||||
"Data": "system-auth - На пробелах в OU падает, версию показать не может"
|
||||
}
|
||||
],
|
||||
"AffectedCPEs": {
|
||||
"CPEs": [
|
||||
"cpe:/o:alt:kworkstation:10",
|
||||
"cpe:/o:alt:workstation:10",
|
||||
"cpe:/o:alt:server:10",
|
||||
"cpe:/o:alt:server-v:10",
|
||||
"cpe:/o:alt:education:10",
|
||||
"cpe:/o:alt:slinux:10",
|
||||
"cpe:/o:alt:starterkit:p10",
|
||||
"cpe:/o:alt:kworkstation:10.1",
|
||||
"cpe:/o:alt:workstation:10.1",
|
||||
"cpe:/o:alt:server:10.1",
|
||||
"cpe:/o:alt:server-v:10.1",
|
||||
"cpe:/o:alt:education:10.1",
|
||||
"cpe:/o:alt:slinux:10.1",
|
||||
"cpe:/o:alt:starterkit:10.1",
|
||||
"cpe:/o:alt:kworkstation:10.2",
|
||||
"cpe:/o:alt:workstation:10.2",
|
||||
"cpe:/o:alt:server:10.2",
|
||||
"cpe:/o:alt:server-v:10.2",
|
||||
"cpe:/o:alt:education:10.2",
|
||||
"cpe:/o:alt:slinux:10.2",
|
||||
"cpe:/o:alt:starterkit:10.2"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Criteria": {
|
||||
"Operator": "AND",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||||
"Comment": "ALT Linux must be installed"
|
||||
}
|
||||
],
|
||||
"Criterias": [
|
||||
{
|
||||
"Operator": "OR",
|
||||
"Criterions": [
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202414103001",
|
||||
"Comment": "alterator-auth is earlier than 0:0.44.11-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202414103002",
|
||||
"Comment": "alterator-roles-common is earlier than 0:0.44.11-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202414103003",
|
||||
"Comment": "task-auth-ad-sssd is earlier than 0:0.44.11-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202414103004",
|
||||
"Comment": "task-auth-ad-winbind is earlier than 0:0.44.11-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202414103005",
|
||||
"Comment": "task-auth-freeipa is earlier than 0:0.44.11-alt1"
|
||||
},
|
||||
{
|
||||
"TestRef": "oval:org.altlinux.errata:tst:202414103006",
|
||||
"Comment": "task-auth-ldap-sssd is earlier than 0:0.44.11-alt1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
64
oval/p10/ALT-PU-2024-14103/objects.json
Normal file
64
oval/p10/ALT-PU-2024-14103/objects.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"TextFileContent54Objects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:2001",
|
||||
"Version": "1",
|
||||
"Comment": "Evaluate `/etc/os-release` file content",
|
||||
"Path": {
|
||||
"Datatype": "string",
|
||||
"Text": "/etc"
|
||||
},
|
||||
"Filepath": {
|
||||
"Datatype": "string",
|
||||
"Text": "os-release"
|
||||
},
|
||||
"Pattern": {
|
||||
"Datatype": "string",
|
||||
"Operation": "pattern match",
|
||||
"Text": "cpe:\\/o:alt:(?!sp)[a-z\\-]+:p?(\\d+)(?:\\.\\d)*"
|
||||
},
|
||||
"Instance": {
|
||||
"Datatype": "int",
|
||||
"Text": "1"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoObjects": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202414103001",
|
||||
"Version": "1",
|
||||
"Comment": "alterator-auth is installed",
|
||||
"Name": "alterator-auth"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202414103002",
|
||||
"Version": "1",
|
||||
"Comment": "alterator-roles-common is installed",
|
||||
"Name": "alterator-roles-common"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202414103003",
|
||||
"Version": "1",
|
||||
"Comment": "task-auth-ad-sssd is installed",
|
||||
"Name": "task-auth-ad-sssd"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202414103004",
|
||||
"Version": "1",
|
||||
"Comment": "task-auth-ad-winbind is installed",
|
||||
"Name": "task-auth-ad-winbind"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202414103005",
|
||||
"Version": "1",
|
||||
"Comment": "task-auth-freeipa is installed",
|
||||
"Name": "task-auth-freeipa"
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:obj:202414103006",
|
||||
"Version": "1",
|
||||
"Comment": "task-auth-ldap-sssd is installed",
|
||||
"Name": "task-auth-ldap-sssd"
|
||||
}
|
||||
]
|
||||
}
|
23
oval/p10/ALT-PU-2024-14103/states.json
Normal file
23
oval/p10/ALT-PU-2024-14103/states.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"TextFileContent54State": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:2001",
|
||||
"Version": "1",
|
||||
"Text": {}
|
||||
}
|
||||
],
|
||||
"RPMInfoStates": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:ste:202414103001",
|
||||
"Version": "1",
|
||||
"Comment": "package EVR is earlier than 0:0.44.11-alt1",
|
||||
"Arch": {},
|
||||
"EVR": {
|
||||
"Text": "0:0.44.11-alt1",
|
||||
"Datatype": "evr_string",
|
||||
"Operation": "less than"
|
||||
},
|
||||
"Subexpression": {}
|
||||
}
|
||||
]
|
||||
}
|
90
oval/p10/ALT-PU-2024-14103/tests.json
Normal file
90
oval/p10/ALT-PU-2024-14103/tests.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"TextFileContent54Tests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:2001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "ALT Linux based on branch 'p10' must be installed",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:2001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:2001"
|
||||
}
|
||||
}
|
||||
],
|
||||
"RPMInfoTests": [
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202414103001",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "alterator-auth is earlier than 0:0.44.11-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202414103001"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202414103002",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "alterator-roles-common is earlier than 0:0.44.11-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202414103002"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202414103003",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "task-auth-ad-sssd is earlier than 0:0.44.11-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202414103003"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202414103004",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "task-auth-ad-winbind is earlier than 0:0.44.11-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202414103004"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202414103005",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "task-auth-freeipa is earlier than 0:0.44.11-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202414103005"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
|
||||
}
|
||||
},
|
||||
{
|
||||
"ID": "oval:org.altlinux.errata:tst:202414103006",
|
||||
"Version": "1",
|
||||
"Check": "all",
|
||||
"Comment": "task-auth-ldap-sssd is earlier than 0:0.44.11-alt1",
|
||||
"Object": {
|
||||
"ObjectRef": "oval:org.altlinux.errata:obj:202414103006"
|
||||
},
|
||||
"State": {
|
||||
"StateRef": "oval:org.altlinux.errata:ste:202414103001"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user