241 lines
11 KiB
JSON
241 lines
11 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20211048",
|
|
"Version": "oval:org.altlinux.errata:def:20211048",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2021-1048: package `odoo` update to version 14.0-alt1.20210112",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p10"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2021-1048",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1048",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-15631",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15631",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-15635",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15635",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-15638",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15638",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-15640",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15640",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2018-15645",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15645",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-11781",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11781",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-11785",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11785",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-11786",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11786",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-44460",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44460",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-44465",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44465",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades odoo to version 14.0-alt1.20210112. \nSecurity Fix(es):\n\n * CVE-2018-15631: Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request.\n\n * CVE-2018-15635: Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name.\n\n * CVE-2018-15638: Cross-site scripting (XSS) issue in mail module in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via crafted channel names.\n\n * CVE-2018-15640: Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request.\n\n * CVE-2018-15645: Improper access control in message routing in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier allows remote authenticated users to create arbitrary records via crafted payloads, which may allow privilege escalation.\n\n * CVE-2019-11781: Improper input validation in portal component in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier, allows remote attackers to trick victims into modifying their account via crafted links, leading to privilege escalation.\n\n * CVE-2019-11785: Improper access control in mail module (followers) in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote authenticated users to obtain access to messages posted on business records there were not given access to, and subscribe to receive future messages.\n\n * CVE-2019-11786: Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote authenticated users to modify translated terms, which may lead to arbitrary content modification on translatable elements.\n\n * CVE-2021-44460: Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows users with deactivated accounts to access the system with the deactivated account and any permission it still holds, via crafted RPC requests.\n\n * CVE-2021-44465: Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows authenticated attackers to subscribe to receive future notifications and comments related to arbitrary business records in the system, via crafted RPC requests.\n\n * #39287: odoo is written in python3, it should not depend on python2",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2021-01-15"
|
|
},
|
|
"Updated": {
|
|
"Date": "2021-01-15"
|
|
},
|
|
"BDUs": null,
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2018-15631",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15631",
|
|
"Impact": "Low",
|
|
"Public": "20190409"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-15635",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15635",
|
|
"Impact": "Low",
|
|
"Public": "20190409"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-15638",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15638",
|
|
"Impact": "Low",
|
|
"Public": "20201222"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-15640",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-863",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15640",
|
|
"Impact": "High",
|
|
"Public": "20190409"
|
|
},
|
|
{
|
|
"ID": "CVE-2018-15645",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-732",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15645",
|
|
"Impact": "Low",
|
|
"Public": "20201222"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-11781",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11781",
|
|
"Impact": "High",
|
|
"Public": "20201222"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-11785",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-862",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11785",
|
|
"Impact": "Low",
|
|
"Public": "20201222"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-11786",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11786",
|
|
"Impact": "Low",
|
|
"Public": "20201222"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-44460",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44460",
|
|
"Impact": "Low",
|
|
"Public": "20230425"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-44465",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44465",
|
|
"Impact": "Low",
|
|
"Public": "20230425"
|
|
}
|
|
],
|
|
"Bugzilla": [
|
|
{
|
|
"ID": "39287",
|
|
"Href": "https://bugzilla.altlinux.org/39287",
|
|
"Data": "odoo is written in python3, it should not depend on python2"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:10",
|
|
"cpe:/o:alt:workstation:10",
|
|
"cpe:/o:alt:server:10",
|
|
"cpe:/o:alt:server-v:10",
|
|
"cpe:/o:alt:education:10",
|
|
"cpe:/o:alt:slinux:10",
|
|
"cpe:/o:alt:starterkit:p10",
|
|
"cpe:/o:alt:kworkstation:10.1",
|
|
"cpe:/o:alt:workstation:10.1",
|
|
"cpe:/o:alt:server:10.1",
|
|
"cpe:/o:alt:server-v:10.1",
|
|
"cpe:/o:alt:education:10.1",
|
|
"cpe:/o:alt:slinux:10.1",
|
|
"cpe:/o:alt:starterkit:10.1",
|
|
"cpe:/o:alt:kworkstation:10.2",
|
|
"cpe:/o:alt:workstation:10.2",
|
|
"cpe:/o:alt:server:10.2",
|
|
"cpe:/o:alt:server-v:10.2",
|
|
"cpe:/o:alt:education:10.2",
|
|
"cpe:/o:alt:slinux:10.2",
|
|
"cpe:/o:alt:starterkit:10.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20211048001",
|
|
"Comment": "odoo is earlier than 0:14.0-alt1.20210112"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |