vuln-list-alt/oval/c9f2/ALT-PU-2021-3646/definitions.json
2024-02-14 09:47:22 +00:00

128 lines
5.1 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213646",
"Version": "oval:org.altlinux.errata:def:20213646",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3646: package `php7-curl` update to version 7.4.27-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3646",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3646",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01814",
"RefURL": "https://bdu.fstec.ru/vul/2017-01814",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02394",
"RefURL": "https://bdu.fstec.ru/vul/2022-02394",
"Source": "BDU"
},
{
"RefID": "CVE-2017-8923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8923",
"Source": "CVE"
},
{
"RefID": "CVE-2021-21707",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21707",
"Source": "CVE"
}
],
"Description": "This update upgrades php7-curl to version 7.4.27-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01814: Уязвимость функции zend_string_extend интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2022-02394: Уязвимость функции simplexml_load_file() интерпретатора PHP , позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * CVE-2017-8923: The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.\n\n * CVE-2021-21707: In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-12-29"
},
"Updated": {
"Date": "2021-12-29"
},
"bdu": [
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"Cwe": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2017-01814",
"Impact": "High",
"Public": "20170512",
"CveID": "BDU:2017-01814"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"Cwe": "CWE-20, CWE-159",
"Href": "https://bdu.fstec.ru/vul/2022-02394",
"Impact": "Low",
"Public": "20211129",
"CveID": "BDU:2022-02394"
}
],
"Cves": [
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8923",
"Impact": "Critical",
"Public": "20170512",
"CveID": "CVE-2017-8923"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"Cwe": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21707",
"Impact": "Low",
"Public": "20211129",
"CveID": "CVE-2021-21707"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213646001",
"Comment": "php7-curl is earlier than 0:7.4.27-alt1"
}
]
}
]
}
}
]
}