2024-06-28 13:17:52 +00:00

133 lines
4.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202830",
"Version": "oval:org.altlinux.errata:def:20202830",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2830: package `libupnp` update to version 1.14.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2830",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2830",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-03726",
"RefURL": "https://bdu.fstec.ru/vul/2021-03726",
"Source": "BDU"
},
{
"RefID": "CVE-2020-13848",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-13848",
"Source": "CVE"
}
],
"Description": "This update upgrades libupnp to version 1.14.0-alt1. \nSecurity Fix(es):\n\n * BDU:2021-03726: Уязвимость функций FindServiceControlURLPath и FindServiceEventURLPath библиотеки для разработки программного обеспечения Portable UPnP SDK, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-13848: Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-09-16"
},
"Updated": {
"Date": "2020-09-16"
},
"BDUs": [
{
"ID": "BDU:2021-03726",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-03726",
"Impact": "High",
"Public": "20200605"
}
],
"CVEs": [
{
"ID": "CVE-2020-13848",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-13848",
"Impact": "High",
"Public": "20200604"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202830001",
"Comment": "libixml11 is earlier than 0:1.14.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202830002",
"Comment": "libupnp-devel is earlier than 0:1.14.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202830003",
"Comment": "libupnp17 is earlier than 0:1.14.0-alt1"
}
]
}
]
}
}
]
}