vuln-list-alt/oval/c10f2/ALT-PU-2024-1917/definitions.json
2024-04-16 14:26:14 +00:00

133 lines
5.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20241917",
"Version": "oval:org.altlinux.errata:def:20241917",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-1917: package `nbd` update to version 3.25-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f2"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-1917",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-1917",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-01639",
"RefURL": "https://bdu.fstec.ru/vul/2022-01639",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01643",
"RefURL": "https://bdu.fstec.ru/vul/2022-01643",
"Source": "BDU"
},
{
"RefID": "CVE-2022-26495",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26495",
"Source": "CVE"
},
{
"RefID": "CVE-2022-26496",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26496",
"Source": "CVE"
}
],
"Description": "This update upgrades nbd to version 3.25-alt1. \nSecurity Fix(es):\n\n * BDU:2022-01639: Уязвимость реализации сетевых блочных устройств nbd, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01643: Уязвимость реализации сетевых блочных устройств nbd, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2022-26495: In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages.\n\n * CVE-2022-26496: In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-02-09"
},
"Updated": {
"Date": "2024-02-09"
},
"BDUs": [
{
"ID": "BDU:2022-01639",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-01639",
"Impact": "Critical",
"Public": "20220322"
},
{
"ID": "BDU:2022-01643",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-121",
"Href": "https://bdu.fstec.ru/vul/2022-01643",
"Impact": "Critical",
"Public": "20220322"
}
],
"CVEs": [
{
"ID": "CVE-2022-26495",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26495",
"Impact": "Critical",
"Public": "20220306"
},
{
"ID": "CVE-2022-26496",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26496",
"Impact": "Critical",
"Public": "20220306"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20241917001",
"Comment": "nbd-client is earlier than 0:3.25-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20241917002",
"Comment": "nbd-doc is earlier than 0:3.25-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20241917003",
"Comment": "nbd-server is earlier than 0:3.25-alt1"
}
]
}
]
}
}
]
}