658 lines
32 KiB
JSON
658 lines
32 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20161086",
|
|
"Version": "oval:org.altlinux.errata:def:20161086",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-1086: package `node` update to version 4.2.6-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p9"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-1086",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1086",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00125",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00125",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00126",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00126",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00127",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00127",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00128",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00128",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-04312",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-04312",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-04313",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-04313",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05844",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05844",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05845",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05845",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05846",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05846",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05847",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05847",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05848",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05848",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05849",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05849",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05850",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05850",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05851",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05851",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05852",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05852",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05853",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05853",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05854",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05854",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05855",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05855",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07477",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07477",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07482",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07482",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07483",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07483",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07485",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07485",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09698",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09698",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00297",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00297",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01653",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01653",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-4450",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4450",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-6668",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6668",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7452",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7452",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7453",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7453",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7454",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7454",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-0224",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-5256",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5256",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-9748",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9748",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-9772",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9772",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0278",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0278",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3194",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-5380",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5380",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8856",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8856",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8859",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8859",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8860",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8860",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-16024",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16024",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades node to version 4.2.6-alt1. \nSecurity Fix(es):\n\n * BDU:2015-00125: Уязвимость программного обеспечения Cisco ACE, позволяющая злоумышленнику перехватить сессию\n\n * BDU:2015-00126: Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику перехватить сессию\n\n * BDU:2015-00127: Уязвимость программного обеспечения Cisco IPS, позволяющая злоумышленнику перехватить сессию\n\n * BDU:2015-00128: Уязвимость программного обеспечения Cisco Unified Communications Manager, позволяющая злоумышленнику перехватить сессию\n\n * BDU:2015-04312: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04313: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05844: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05845: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05846: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05847: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05848: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05849: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05850: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05851: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05852: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05853: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05854: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05855: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-07477: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-07482: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-07483: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-07485: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09698: Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2016-00297: Уязвимость операционной системы Fedora, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2016-01653: Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2013-4450: The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.\n\n * CVE-2013-6668: Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2013-7452: The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.\n\n * CVE-2013-7453: The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.\n\n * CVE-2013-7454: The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via nested forbidden strings.\n\n * CVE-2014-0224: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.\n\n * CVE-2014-5256: Node.js 0.8 before 0.8.28 and 0.10 before 0.10.30 does not consider the possibility of recursive processing that triggers V8 garbage collection in conjunction with a V8 interrupt, which allows remote attackers to cause a denial of service (memory corruption and application crash) via deep JSON objects whose parsing lets this interrupt mask an overflow of the program stack.\n\n * CVE-2014-9748: The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition.\n\n * CVE-2014-9772: The validator package before 2.0.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via hex-encoded characters.\n\n * CVE-2015-0278: libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attackers to gain privileges via unspecified vectors.\n\n * CVE-2015-3194: crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.\n\n * CVE-2015-5380: The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.\n\n * CVE-2015-8856: Cross-site scripting (XSS) vulnerability in the serve-index package before 1.6.3 for Node.js allows remote attackers to inject arbitrary web script or HTML via a crafted file or directory name.\n\n * CVE-2015-8859: The send package before 0.11.1 for Node.js allows attackers to obtain the root path via unspecified vectors.\n\n * CVE-2015-8860: The tar package before 2.0.0 for Node.js allows remote attackers to write to arbitrary files via a symlink attack in an archive.\n\n * CVE-2017-16024: The sync-exec module is used to simulate child_process.execSync in node versions \u003c0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists.\n\n * #30191: Собрать версию 4.2.6 LTS",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-02-10"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-02-10"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-00125",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00125",
|
|
"Impact": "Low",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00126",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00126",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00127",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00127",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00128",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00128",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-04312",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-04312",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-04313",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-04313",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05844",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05844",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05845",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05845",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05846",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05846",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05847",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05847",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05848",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05848",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05849",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05849",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05850",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05850",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05851",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05851",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05852",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05852",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05853",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05853",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05854",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05854",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05855",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05855",
|
|
"Impact": "Low",
|
|
"Public": "19700101"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07477",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07477",
|
|
"Impact": "Critical",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07482",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07482",
|
|
"Impact": "High",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07483",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07483",
|
|
"Impact": "Low",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07485",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07485",
|
|
"Impact": "Critical",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09698",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09698",
|
|
"Impact": "Low",
|
|
"Public": "20140727"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00297",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00297",
|
|
"Impact": "Critical",
|
|
"Public": "20150518"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01653",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01653",
|
|
"Impact": "Low",
|
|
"Public": "20151206"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2013-4450",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4450",
|
|
"Impact": "Low",
|
|
"Public": "20131021"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-6668",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6668",
|
|
"Impact": "High",
|
|
"Public": "20140305"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7452",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7452",
|
|
"Impact": "Low",
|
|
"Public": "20170123"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7453",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7453",
|
|
"Impact": "Low",
|
|
"Public": "20170123"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-7454",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7454",
|
|
"Impact": "Low",
|
|
"Public": "20170123"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-0224",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224",
|
|
"Impact": "High",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-5256",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5256",
|
|
"Impact": "Low",
|
|
"Public": "20140905"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-9748",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-362",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9748",
|
|
"Impact": "High",
|
|
"Public": "20200211"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-9772",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9772",
|
|
"Impact": "Low",
|
|
"Public": "20170123"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0278",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-273",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0278",
|
|
"Impact": "Critical",
|
|
"Public": "20150518"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3194",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3194",
|
|
"Impact": "High",
|
|
"Public": "20151206"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-5380",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5380",
|
|
"Impact": "High",
|
|
"Public": "20150709"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8856",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8856",
|
|
"Impact": "Low",
|
|
"Public": "20170123"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8859",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8859",
|
|
"Impact": "Low",
|
|
"Public": "20170123"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8860",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-59",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8860",
|
|
"Impact": "High",
|
|
"Public": "20170123"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-16024",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16024",
|
|
"Impact": "Low",
|
|
"Public": "20180604"
|
|
}
|
|
],
|
|
"Bugzilla": [
|
|
{
|
|
"ID": "30191",
|
|
"Href": "https://bugzilla.altlinux.org/30191",
|
|
"Data": "Собрать версию 4.2.6 LTS"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:9",
|
|
"cpe:/o:alt:workstation:9",
|
|
"cpe:/o:alt:server:9",
|
|
"cpe:/o:alt:server-v:9",
|
|
"cpe:/o:alt:education:9",
|
|
"cpe:/o:alt:slinux:9",
|
|
"cpe:/o:alt:starterkit:p9",
|
|
"cpe:/o:alt:kworkstation:9.1",
|
|
"cpe:/o:alt:workstation:9.1",
|
|
"cpe:/o:alt:server:9.1",
|
|
"cpe:/o:alt:server-v:9.1",
|
|
"cpe:/o:alt:education:9.1",
|
|
"cpe:/o:alt:slinux:9.1",
|
|
"cpe:/o:alt:starterkit:9.1",
|
|
"cpe:/o:alt:kworkstation:9.2",
|
|
"cpe:/o:alt:workstation:9.2",
|
|
"cpe:/o:alt:server:9.2",
|
|
"cpe:/o:alt:server-v:9.2",
|
|
"cpe:/o:alt:education:9.2",
|
|
"cpe:/o:alt:slinux:9.2",
|
|
"cpe:/o:alt:starterkit:9.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161086001",
|
|
"Comment": "node is earlier than 0:4.2.6-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161086002",
|
|
"Comment": "node-devel is earlier than 0:4.2.6-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161086003",
|
|
"Comment": "node-doc is earlier than 0:4.2.6-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161086004",
|
|
"Comment": "npm is earlier than 0:2.14.12-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |