101 lines
3.7 KiB
JSON
101 lines
3.7 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20212040",
|
||
"Version": "oval:org.altlinux.errata:def:20212040",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-2040: package `ansible` update to version 2.9.23-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-2040",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2040",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00285",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00285",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3583",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3583",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades ansible to version 2.9.23-alt1. \nSecurity Fix(es):\n\n * BDU:2023-00285: Уязвимость программного пакета Ansible, связанная с непринятием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * CVE-2021-3583: A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-06-22"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-06-22"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2023-00285",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-77",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00285",
|
||
"Impact": "High",
|
||
"Public": "20210607"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2021-3583",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-94",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3583",
|
||
"Impact": "High",
|
||
"Public": "20210922"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:5001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20212040001",
|
||
"Comment": "ansible is earlier than 0:2.9.23-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |