2024-12-12 21:07:30 +00:00

101 lines
3.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20212040",
"Version": "oval:org.altlinux.errata:def:20212040",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-2040: package `ansible` update to version 2.9.23-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-2040",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2040",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-00285",
"RefURL": "https://bdu.fstec.ru/vul/2023-00285",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3583",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3583",
"Source": "CVE"
}
],
"Description": "This update upgrades ansible to version 2.9.23-alt1. \nSecurity Fix(es):\n\n * BDU:2023-00285: Уязвимость программного пакета Ansible, связанная с непринятием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * CVE-2021-3583: A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-06-22"
},
"Updated": {
"Date": "2021-06-22"
},
"BDUs": [
{
"ID": "BDU:2023-00285",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-77",
"Href": "https://bdu.fstec.ru/vul/2023-00285",
"Impact": "High",
"Public": "20210607"
}
],
"CVEs": [
{
"ID": "CVE-2021-3583",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3583",
"Impact": "High",
"Public": "20210922"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:5001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20212040001",
"Comment": "ansible is earlier than 0:2.9.23-alt1"
}
]
}
]
}
}
]
}