2025-03-03 12:05:02 +00:00

430 lines
20 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202183",
"Version": "oval:org.altlinux.errata:def:20202183",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2183: package `mysql-workbench-community` update to version 8.0.20-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2183",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2183",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-00404",
"RefURL": "https://bdu.fstec.ru/vul/2020-00404",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01425",
"RefURL": "https://bdu.fstec.ru/vul/2020-01425",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01426",
"RefURL": "https://bdu.fstec.ru/vul/2020-01426",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01432",
"RefURL": "https://bdu.fstec.ru/vul/2020-01432",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01434",
"RefURL": "https://bdu.fstec.ru/vul/2020-01434",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01435",
"RefURL": "https://bdu.fstec.ru/vul/2020-01435",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01452",
"RefURL": "https://bdu.fstec.ru/vul/2020-01452",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01748",
"RefURL": "https://bdu.fstec.ru/vul/2020-01748",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02371",
"RefURL": "https://bdu.fstec.ru/vul/2020-02371",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02642",
"RefURL": "https://bdu.fstec.ru/vul/2020-02642",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04085",
"RefURL": "https://bdu.fstec.ru/vul/2020-04085",
"Source": "BDU"
},
{
"RefID": "CVE-2019-14889",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14889",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19242",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19242",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19244",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19244",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19317",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19317",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19603",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19603",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19645",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19645",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19646",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19646",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19880",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19880",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19924",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19924",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19925",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19926",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20218",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20218",
"Source": "CVE"
}
],
"Description": "This update upgrades mysql-workbench-community to version 8.0.20-alt1. \nSecurity Fix(es):\n\n * BDU:2020-00404: Уязвимость функции exprListAppendList () системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01425: Уязвимость функции sqlite3ExprCodeTarget системы управления базами данных SQLite, связанная с разыменованием указателя null, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01426: Уязвимость функции sqlite3Select системы управления базами данных SQLite, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01432: Уязвимость системы управления базами данных SQLite, связанная с неконтролируемой рекурсией, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01434: Уязвимость функции flattenSubquery() системы управления базами данных SQLite, связанная с разыменованием указателя null, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01435: Уязвимость функции sqlite3WindowRewrite() системы управления базами данных SQLite, связанная с недостаточной обработкой исключительных состояний, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01452: Уязвимость функции sqlite3WindowRewrite системы управления базами данных SQLite, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01748: Уязвимость функции zipfileUpdate() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02371: Уязвимость реализации команды integrity_check PRAGMA системы управления базами данных SQLite, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-02642: Уязвимость функции ssh_scp_new() библиотеки libssh, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04085: Уязвимость программного обеспечения для СУБД SQLite, связанная с ошибками при обработке чисел, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-14889: A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.\n\n * CVE-2019-19242: SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.\n\n * CVE-2019-19244: sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.\n\n * CVE-2019-19317: lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.\n\n * CVE-2019-19603: SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.\n\n * CVE-2019-19645: alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.\n\n * CVE-2019-19646: pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.\n\n * CVE-2019-19880: exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.\n\n * CVE-2019-19923: flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).\n\n * CVE-2019-19924: SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.\n\n * CVE-2019-19925: zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.\n\n * CVE-2019-19926: multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.\n\n * CVE-2019-20218: selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.\n\n * #38563: 8.0.20",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2025 BaseALT Ltd.",
"Issued": {
"Date": "2020-06-15"
},
"Updated": {
"Date": "2020-06-15"
},
"BDUs": [
{
"ID": "BDU:2020-00404",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-00404",
"Impact": "High",
"Public": "20191118"
},
{
"ID": "BDU:2020-01425",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-01425",
"Impact": "Low",
"Public": "20191115"
},
{
"ID": "BDU:2020-01426",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01426",
"Impact": "High",
"Public": "20191115"
},
{
"ID": "BDU:2020-01432",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-674",
"Href": "https://bdu.fstec.ru/vul/2020-01432",
"Impact": "Low",
"Public": "20191209"
},
{
"ID": "BDU:2020-01434",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-01434",
"Impact": "High",
"Public": "20191209"
},
{
"ID": "BDU:2020-01435",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-755",
"Href": "https://bdu.fstec.ru/vul/2020-01435",
"Impact": "Low",
"Public": "20191209"
},
{
"ID": "BDU:2020-01452",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-01452",
"Impact": "High",
"Public": "20191222"
},
{
"ID": "BDU:2020-01748",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-434",
"Href": "https://bdu.fstec.ru/vul/2020-01748",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "BDU:2020-02371",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-754",
"Href": "https://bdu.fstec.ru/vul/2020-02371",
"Impact": "Critical",
"Public": "20191209"
},
{
"ID": "BDU:2020-02642",
"CVSS": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-77",
"Href": "https://bdu.fstec.ru/vul/2020-02642",
"Impact": "High",
"Public": "20200415"
},
{
"ID": "BDU:2020-04085",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2020-04085",
"Impact": "High",
"Public": "20190912"
}
],
"CVEs": [
{
"ID": "CVE-2019-14889",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-78",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14889",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-19242",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19242",
"Impact": "Low",
"Public": "20191127"
},
{
"ID": "CVE-2019-19244",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19244",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-19317",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-681",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19317",
"Impact": "Critical",
"Public": "20191205"
},
{
"ID": "CVE-2019-19603",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19603",
"Impact": "High",
"Public": "20191209"
},
{
"ID": "CVE-2019-19645",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-674",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19645",
"Impact": "Low",
"Public": "20191209"
},
{
"ID": "CVE-2019-19646",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19646",
"Impact": "Critical",
"Public": "20191209"
},
{
"ID": "CVE-2019-19880",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19880",
"Impact": "High",
"Public": "20191218"
},
{
"ID": "CVE-2019-19923",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "CVE-2019-19924",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19924",
"Impact": "Low",
"Public": "20191224"
},
{
"ID": "CVE-2019-19925",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-434",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "CVE-2019-19926",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926",
"Impact": "High",
"Public": "20191223"
},
{
"ID": "CVE-2019-20218",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20218",
"Impact": "High",
"Public": "20200102"
}
],
"Bugzilla": [
{
"ID": "38563",
"Href": "https://bugzilla.altlinux.org/38563",
"Data": "8.0.20"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202183001",
"Comment": "mysql-workbench-community is earlier than 0:8.0.20-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202183002",
"Comment": "mysql-workbench-community-data is earlier than 0:8.0.20-alt1"
}
]
}
]
}
}
]
}