456 lines
24 KiB
JSON
456 lines
24 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20211712",
|
||
"Version": "oval:org.altlinux.errata:def:20211712",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-1712: package `mediawiki` update to version 1.35.2-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p10"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-1712",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1712",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03165",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03165",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03167",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03167",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03168",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03168",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03170",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03170",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03171",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03171",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03173",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03173",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03174",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03174",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03741",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03741",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35622",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35622",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35623",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35623",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35624",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35624",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35625",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35625",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-35626",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35626",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-20270",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20270",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-27291",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-27291",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30152",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30152",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30153",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30153",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30154",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30154",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30155",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30155",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30156",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30156",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30157",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30157",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30158",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30158",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30159",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30159",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-30458",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-30458",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades mediawiki to version 1.35.2-alt1. \nSecurity Fix(es):\n\n * BDU:2021-03165: Уязвимость программного интерфейса \u0026quot;защиты\u0026quot; страницы программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03167: Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, связанная с недостатками процедуры аутентификации, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2021-03168: Уязвимость функции ContentModelChange программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03170: Уязвимость функций MovePage::isValidMoveTarget(), Title::getArticleID(), MovePage::moveToInternal() программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2021-03171: Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовый скриптинг\n\n * BDU:2021-03173: Уязвимость функции SMLLexer библиотеки Pygments, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03174: Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2021-03741: Уязвимость программы подсветки синтаксиса Pygments, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-35622: An issue was discovered in the GlobalUsage extension for MediaWiki through 1.35.1. SpecialGlobalUsage.php calls WikiMap::makeForeignLink unsafely. The $page variable within the formatItem function was not being properly escaped, allowing for XSS under certain conditions.\n\n * CVE-2020-35623: An issue was discovered in the CasAuth extension for MediaWiki through 1.35.1. Due to improper username validation, it allowed user impersonation with trivial manipulations of certain characters within a given username. An ordinary user may be able to login as a \"bureaucrat user\" who has a similar username, as demonstrated by usernames that differ only in (1) bidirectional override symbols or (2) blank space.\n\n * CVE-2020-35624: An issue was discovered in the SecurePoll extension for MediaWiki through 1.35.1. The non-admin vote list contains a full vote timestamp, which may provide unintended clues about how a voting process unfolded.\n\n * CVE-2020-35625: An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \\MediaWiki\\Shell\\Shell::command within a comment.\n\n * CVE-2020-35626: An issue was discovered in the PushToWatch extension for MediaWiki through 1.35.1. The primary form did not implement an anti-CSRF token and therefore was completely vulnerable to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php.\n\n * CVE-2021-20270: An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the \"exception\" keyword.\n\n * CVE-2021-27291: In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.\n\n * CVE-2021-30152: An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to \"protect\" a page, a user is currently able to protect to a higher level than they currently have permissions for.\n\n * CVE-2021-30153: An issue was discovered in the VisualEditor extension in MediaWiki before 1.31.13, and 1.32.x through 1.35.x before 1.35.2. . When using VisualEditor to edit a MediaWiki user page belonging to an existing, but hidden, user, VisualEditor will disclose that the user exists. (It shouldn't because they are hidden.) This is related to ApiVisualEditor.\n\n * CVE-2021-30154: An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS.\n\n * CVE-2021-30155: An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page.\n\n * CVE-2021-30156: An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a \"hidden\" user exists.\n\n * CVE-2021-30157: An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS.\n\n * CVE-2021-30158: An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party.\n\n * CVE-2021-30159: An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain \"fast double move\" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it's only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master.\n\n * CVE-2021-30458: An issue was discovered in Wikimedia Parsoid before 0.11.1 and 0.12.x before 0.12.2. An attacker can send crafted wikitext that Utils/WTUtils.php will transform by using a \u003cmeta\u003e tag, bypassing sanitization steps, and potentially allowing for XSS.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-04-25"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-04-25"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2021-03165",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03165",
|
||
"Impact": "Low",
|
||
"Public": "20210409"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03167",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03167",
|
||
"Impact": "Low",
|
||
"Public": "20210406"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03168",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03168",
|
||
"Impact": "Low",
|
||
"Public": "20210409"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03170",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03170",
|
||
"Impact": "Low",
|
||
"Public": "20210409"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03171",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03171",
|
||
"Impact": "Low",
|
||
"Public": "20210406"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03173",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03173",
|
||
"Impact": "High",
|
||
"Public": "20201210"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03174",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03174",
|
||
"Impact": "Low",
|
||
"Public": "20210406"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03741",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03741",
|
||
"Impact": "High",
|
||
"Public": "20210103"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2020-35622",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35622",
|
||
"Impact": "Low",
|
||
"Public": "20201221"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35623",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35623",
|
||
"Impact": "High",
|
||
"Public": "20201221"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35624",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35624",
|
||
"Impact": "Low",
|
||
"Public": "20201221"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35625",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35625",
|
||
"Impact": "High",
|
||
"Public": "20201221"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-35626",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-352",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35626",
|
||
"Impact": "High",
|
||
"Public": "20201221"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-20270",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20270",
|
||
"Impact": "High",
|
||
"Public": "20210323"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-27291",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-1333",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-27291",
|
||
"Impact": "High",
|
||
"Public": "20210317"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30152",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30152",
|
||
"Impact": "Low",
|
||
"Public": "20210409"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30153",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30153",
|
||
"Impact": "Low",
|
||
"Public": "20230415"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30154",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30154",
|
||
"Impact": "Low",
|
||
"Public": "20210406"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30155",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30155",
|
||
"Impact": "Low",
|
||
"Public": "20210409"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30156",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30156",
|
||
"Impact": "Low",
|
||
"Public": "20210409"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30157",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30157",
|
||
"Impact": "Low",
|
||
"Public": "20210406"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30158",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-287",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30158",
|
||
"Impact": "Low",
|
||
"Public": "20210406"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30159",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30159",
|
||
"Impact": "Low",
|
||
"Public": "20210409"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-30458",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-30458",
|
||
"Impact": "Low",
|
||
"Public": "20210409"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:10",
|
||
"cpe:/o:alt:workstation:10",
|
||
"cpe:/o:alt:server:10",
|
||
"cpe:/o:alt:server-v:10",
|
||
"cpe:/o:alt:education:10",
|
||
"cpe:/o:alt:slinux:10",
|
||
"cpe:/o:alt:starterkit:p10",
|
||
"cpe:/o:alt:kworkstation:10.1",
|
||
"cpe:/o:alt:workstation:10.1",
|
||
"cpe:/o:alt:server:10.1",
|
||
"cpe:/o:alt:server-v:10.1",
|
||
"cpe:/o:alt:education:10.1",
|
||
"cpe:/o:alt:slinux:10.1",
|
||
"cpe:/o:alt:starterkit:10.1",
|
||
"cpe:/o:alt:kworkstation:10.2",
|
||
"cpe:/o:alt:workstation:10.2",
|
||
"cpe:/o:alt:server:10.2",
|
||
"cpe:/o:alt:server-v:10.2",
|
||
"cpe:/o:alt:education:10.2",
|
||
"cpe:/o:alt:slinux:10.2",
|
||
"cpe:/o:alt:starterkit:10.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211712001",
|
||
"Comment": "mediawiki is earlier than 0:1.35.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211712002",
|
||
"Comment": "mediawiki-apache2 is earlier than 0:1.35.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211712003",
|
||
"Comment": "mediawiki-common is earlier than 0:1.35.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211712004",
|
||
"Comment": "mediawiki-extensions-PdfHandler is earlier than 0:1.35.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211712005",
|
||
"Comment": "mediawiki-extensions-SyntaxHighlight_GeSHi is earlier than 1:1.35.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211712006",
|
||
"Comment": "mediawiki-mysql is earlier than 0:1.35.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20211712007",
|
||
"Comment": "mediawiki-postgresql is earlier than 0:1.35.2-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |