2024-06-28 13:17:52 +00:00

283 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20203030",
"Version": "oval:org.altlinux.errata:def:20203030",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-3030: package `jackson-databind` update to version 2.9.9.3-alt1_1jpp8",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-3030",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3030",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02899",
"RefURL": "https://bdu.fstec.ru/vul/2019-02899",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02925",
"RefURL": "https://bdu.fstec.ru/vul/2019-02925",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04025",
"RefURL": "https://bdu.fstec.ru/vul/2019-04025",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04086",
"RefURL": "https://bdu.fstec.ru/vul/2019-04086",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04087",
"RefURL": "https://bdu.fstec.ru/vul/2019-04087",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04251",
"RefURL": "https://bdu.fstec.ru/vul/2019-04251",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04252",
"RefURL": "https://bdu.fstec.ru/vul/2019-04252",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04253",
"RefURL": "https://bdu.fstec.ru/vul/2019-04253",
"Source": "BDU"
},
{
"RefID": "CVE-2019-12086",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12086",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12384",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12814",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14379",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14439",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439",
"Source": "CVE"
}
],
"Description": "This update upgrades jackson-databind to version 2.9.9.3-alt1_1jpp8. \nSecurity Fix(es):\n\n * BDU:2019-02899: Уязвимость функции FasterXML Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2019-02925: Уязвимость класса logback-core библиотеки Jackson-databind, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04025: Уязвимость файла SubTypeValidator.java библиотеки Jackson-databind, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04086: Уязвимость функции FasterXML Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04087: Уязвимость функции FasterXM Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04251: Уязвимость библиотеки Jackson-databind, связанная с отсутствием защиты служебных данных, позволяющая нарушителю читать произвольные файлы на сервере\n\n * BDU:2019-04252: Уязвимость библиотеки Jackson-databind, связанная с неспособностью заблокировать класс logback-core от полиморфной десериализации, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04253: Уязвимость библиотеки Jackson-databind, связанная с отсутствием защиты служебных данных, позволяющая нарушителю прочитать произвольные файлы на сервере\n\n * CVE-2019-12086: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.\n\n * CVE-2019-12384: FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.\n\n * CVE-2019-12814: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.\n\n * CVE-2019-14379: SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.\n\n * CVE-2019-14439: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-10-12"
},
"Updated": {
"Date": "2020-10-12"
},
"BDUs": [
{
"ID": "BDU:2019-02899",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-02899",
"Impact": "High",
"Public": "20190529"
},
{
"ID": "BDU:2019-02925",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-02925",
"Impact": "Low",
"Public": "20190516"
},
{
"ID": "BDU:2019-04025",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-04025",
"Impact": "Critical",
"Public": "20190703"
},
{
"ID": "BDU:2019-04086",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-04086",
"Impact": "High",
"Public": "20190910"
},
{
"ID": "BDU:2019-04087",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-04087",
"Impact": "Critical",
"Public": "20190910"
},
{
"ID": "BDU:2019-04251",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200, CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-04251",
"Impact": "Low",
"Public": "20190619"
},
{
"ID": "BDU:2019-04252",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-04252",
"Impact": "Low",
"Public": "20190624"
},
{
"ID": "BDU:2019-04253",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04253",
"Impact": "High",
"Public": "20190516"
}
],
"CVEs": [
{
"ID": "CVE-2019-12086",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12086",
"Impact": "High",
"Public": "20190517"
},
{
"ID": "CVE-2019-12384",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384",
"Impact": "Low",
"Public": "20190624"
},
{
"ID": "CVE-2019-12814",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814",
"Impact": "Low",
"Public": "20190619"
},
{
"ID": "CVE-2019-14379",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-1321",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379",
"Impact": "Critical",
"Public": "20190729"
},
{
"ID": "CVE-2019-14439",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439",
"Impact": "High",
"Public": "20190730"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20203030001",
"Comment": "jackson-databind is earlier than 0:2.9.9.3-alt1_1jpp8"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203030002",
"Comment": "jackson-databind-javadoc is earlier than 0:2.9.9.3-alt1_1jpp8"
}
]
}
]
}
}
]
}