2024-07-26 21:05:20 +00:00

381 lines
18 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191580",
"Version": "oval:org.altlinux.errata:def:20191580",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1580: package `apache2` update to version 2.4.39-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1580",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1580",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01404",
"RefURL": "https://bdu.fstec.ru/vul/2019-01404",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02559",
"RefURL": "https://bdu.fstec.ru/vul/2019-02559",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04285",
"RefURL": "https://bdu.fstec.ru/vul/2019-04285",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04407",
"RefURL": "https://bdu.fstec.ru/vul/2019-04407",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04408",
"RefURL": "https://bdu.fstec.ru/vul/2019-04408",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04409",
"RefURL": "https://bdu.fstec.ru/vul/2019-04409",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04410",
"RefURL": "https://bdu.fstec.ru/vul/2019-04410",
"Source": "BDU"
},
{
"RefID": "CVE-2019-0196",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196",
"Source": "CVE"
},
{
"RefID": "CVE-2019-0197",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197",
"Source": "CVE"
},
{
"RefID": "CVE-2019-0211",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"Source": "CVE"
},
{
"RefID": "CVE-2019-0215",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215",
"Source": "CVE"
},
{
"RefID": "CVE-2019-0217",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-0217",
"Source": "CVE"
},
{
"RefID": "CVE-2019-0220",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-0220",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10097",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10097",
"Source": "CVE"
}
],
"Description": "This update upgrades apache2 to version 2.4.39-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01404: Уязвимость модуля MPM веб-сервера Apache HTTP, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2019-02559: Уязвимость модуля mod_http2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к конфиденциальной информации\n\n * BDU:2019-04285: Уязвимость модуля mod_remoteip веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04407: Уязвимость модуля RewriteRule веб-сервера Apache, связанная с использованием имени с неправильной ссылкой, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2019-04408: Уязвимость компонента mod_auth_digest веб-сервера Apache HTTP Server, позволяющая нарушителю проходить аутентификацию, используя другое имя пользователя\n\n * BDU:2019-04409: Уязвимость компонента mod_ssl веб-сервера Apache HTTP Server, позволяющая нарушителю обойти настроенные ограничения контроля доступа\n\n * BDU:2019-04410: Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или привести к неверной конфигурации сервера\n\n * CVE-2019-0196: A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.\n\n * CVE-2019-0197: A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.\n\n * CVE-2019-0211: In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.\n\n * CVE-2019-0215: In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.\n\n * CVE-2019-0217: In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.\n\n * CVE-2019-0220: A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.\n\n * CVE-2019-10097: In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the \"PROXY\" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-04-03"
},
"Updated": {
"Date": "2019-04-03"
},
"BDUs": [
{
"ID": "BDU:2019-01404",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-250, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01404",
"Impact": "High",
"Public": "20190408"
},
{
"ID": "BDU:2019-02559",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-02559",
"Impact": "Low",
"Public": "20190611"
},
{
"ID": "BDU:2019-04285",
"CVSS": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-04285",
"Impact": "High",
"Public": "20190723"
},
{
"ID": "BDU:2019-04407",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-399, CWE-706",
"Href": "https://bdu.fstec.ru/vul/2019-04407",
"Impact": "Low",
"Public": "20190611"
},
{
"ID": "BDU:2019-04408",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2019-04408",
"Impact": "Low",
"Public": "20190408"
},
{
"ID": "BDU:2019-04409",
"CVSS": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-04409",
"Impact": "High",
"Public": "20190123"
},
{
"ID": "BDU:2019-04410",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"CWE": "CWE-444",
"Href": "https://bdu.fstec.ru/vul/2019-04410",
"Impact": "Low",
"Public": "20190129"
}
],
"CVEs": [
{
"ID": "CVE-2019-0196",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196",
"Impact": "Low",
"Public": "20190611"
},
{
"ID": "CVE-2019-0197",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"CWE": "CWE-444",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197",
"Impact": "Low",
"Public": "20190611"
},
{
"ID": "CVE-2019-0211",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"Impact": "High",
"Public": "20190408"
},
{
"ID": "CVE-2019-0215",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215",
"Impact": "High",
"Public": "20190408"
},
{
"ID": "CVE-2019-0217",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-0217",
"Impact": "High",
"Public": "20190408"
},
{
"ID": "CVE-2019-0220",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-706",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-0220",
"Impact": "Low",
"Public": "20190611"
},
{
"ID": "CVE-2019-10097",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10097",
"Impact": "High",
"Public": "20190926"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191580001",
"Comment": "apache2 is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580002",
"Comment": "apache2-ab is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580003",
"Comment": "apache2-base is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580004",
"Comment": "apache2-cgi-bin is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580005",
"Comment": "apache2-cgi-bin-printenv is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580006",
"Comment": "apache2-cgi-bin-test-cgi is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580007",
"Comment": "apache2-compat is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580008",
"Comment": "apache2-configs-A1PROXIED is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580009",
"Comment": "apache2-datadirs is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580010",
"Comment": "apache2-devel is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580011",
"Comment": "apache2-docs is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580012",
"Comment": "apache2-full is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580013",
"Comment": "apache2-htcacheclean is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580014",
"Comment": "apache2-htcacheclean-control is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580015",
"Comment": "apache2-html is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580016",
"Comment": "apache2-htpasswd is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580017",
"Comment": "apache2-httpd-event is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580018",
"Comment": "apache2-httpd-prefork is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580019",
"Comment": "apache2-httpd-worker is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580020",
"Comment": "apache2-icons is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580021",
"Comment": "apache2-manual is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580022",
"Comment": "apache2-manual-addons is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580023",
"Comment": "apache2-mod_cache_disk is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580024",
"Comment": "apache2-mod_ldap is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580025",
"Comment": "apache2-mod_ssl is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580026",
"Comment": "apache2-mod_ssl-compat is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580027",
"Comment": "apache2-mods is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580028",
"Comment": "apache2-suexec is earlier than 1:2.4.39-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191580029",
"Comment": "rpm-build-apache2 is earlier than 1:2.4.39-alt1"
}
]
}
]
}
}
]
}