2024-04-16 14:26:14 +00:00

128 lines
4.6 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20242024",
"Version": "oval:org.altlinux.errata:def:20242024",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-2024: package `apache2-mod_wsgi` update to version 4.9.4-alt0.p10.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-2024",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-2024",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-05209",
"RefURL": "https://bdu.fstec.ru/vul/2022-05209",
"Source": "BDU"
},
{
"RefID": "CVE-2022-2255",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2255",
"Source": "CVE"
}
],
"Description": "This update upgrades apache2-mod_wsgi to version 4.9.4-alt0.p10.1. \nSecurity Fix(es):\n\n * BDU:2022-05209: Уязвимость модуля mod_wsgi веб-сервера Apache, связанная с ошибками при обработке заголовока X-Client-IP, позволяющая нарушителю получить несанкционированный доступ к сетевым службам\n\n * CVE-2022-2255: A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-02-13"
},
"Updated": {
"Date": "2024-02-13"
},
"BDUs": [
{
"ID": "BDU:2022-05209",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-348",
"Href": "https://bdu.fstec.ru/vul/2022-05209",
"Impact": "Low",
"Public": "20220718"
}
],
"CVEs": [
{
"ID": "CVE-2022-2255",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-345",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2255",
"Impact": "High",
"Public": "20220825"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20242024001",
"Comment": "apache2-mod_wsgi is earlier than 0:4.9.4-alt0.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20242024002",
"Comment": "apache2-mod_wsgi-py3 is earlier than 0:4.9.4-alt0.p10.1"
}
]
}
]
}
}
]
}