2024-06-28 13:17:52 +00:00

119 lines
4.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171816",
"Version": "oval:org.altlinux.errata:def:20171816",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1816: package `libtirpc` update to version 1.0.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1816",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1816",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-05819",
"RefURL": "https://bdu.fstec.ru/vul/2021-05819",
"Source": "BDU"
},
{
"RefID": "CVE-2017-8779",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8779",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14621",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14621",
"Source": "CVE"
}
],
"Description": "This update upgrades libtirpc to version 1.0.2-alt1. \nSecurity Fix(es):\n\n * BDU:2021-05819: Уязвимость сервера динамического назначения RPC-портов RPCbind, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-8779: rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.\n\n * CVE-2018-14621: An infinite loop vulnerability was found in libtirpc before version 1.0.2-rc2. With the port to using poll rather than select, exhaustion of file descriptors would cause the server to enter an infinite loop, consuming a large amount of CPU time and denying service to other clients until restarted.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-07-06"
},
"Updated": {
"Date": "2017-07-06"
},
"BDUs": [
{
"ID": "BDU:2021-05819",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://bdu.fstec.ru/vul/2021-05819",
"Impact": "High",
"Public": "20170503"
}
],
"CVEs": [
{
"ID": "CVE-2017-8779",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8779",
"Impact": "High",
"Public": "20170504"
},
{
"ID": "CVE-2018-14621",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14621",
"Impact": "High",
"Public": "20180830"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171816001",
"Comment": "libtirpc is earlier than 0:1.0.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171816002",
"Comment": "libtirpc-devel is earlier than 0:1.0.2-alt1"
}
]
}
]
}
}
]
}