vuln-list-alt/oval/p11/ALT-PU-2019-1318/definitions.json
2024-12-12 21:07:30 +00:00

213 lines
9.7 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191318",
"Version": "oval:org.altlinux.errata:def:20191318",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1318: package `libpng12` update to version 1.2.59-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1318",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1318",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-12011",
"RefURL": "https://bdu.fstec.ru/vul/2015-12011",
"Source": "BDU"
},
{
"RefID": "BDU:2015-12117",
"RefURL": "https://bdu.fstec.ru/vul/2015-12117",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01652",
"RefURL": "https://bdu.fstec.ru/vul/2016-01652",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01664",
"RefURL": "https://bdu.fstec.ru/vul/2016-01664",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00462",
"RefURL": "https://bdu.fstec.ru/vul/2018-00462",
"Source": "BDU"
},
{
"RefID": "CVE-2015-7981",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-7981",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8126",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8126",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8472",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8472",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8540",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8540",
"Source": "CVE"
},
{
"RefID": "CVE-2016-10087",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10087",
"Source": "CVE"
}
],
"Description": "This update upgrades libpng12 to version 1.2.59-alt1. \nSecurity Fix(es):\n\n * BDU:2015-12011: Уязвимости библиотеки libpng, позволяющие нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-12117: Уязвимость библиотеки libpng и операционных систем Ubuntu, Debian GNU/Linux, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2016-01652: Уязвимость библиотеки libpng, позволяющая нарушителю повлиять на целостность, доступность и конфиденциальность информации\n\n * BDU:2016-01664: Уязвимость библиотеки libpng, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2018-00462: Уязвимость функции png_set_text_2 библиотеки libpng, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2015-7981: The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.\n\n * CVE-2015-8126: Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.\n\n * CVE-2015-8472: Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.\n\n * CVE-2015-8540: Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.\n\n * CVE-2016-10087: The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-02-27"
},
"Updated": {
"Date": "2019-02-27"
},
"BDUs": [
{
"ID": "BDU:2015-12011",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-12011",
"Impact": "High",
"Public": "20151113"
},
{
"ID": "BDU:2015-12117",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2015-12117",
"Impact": "Low",
"Public": "20151124"
},
{
"ID": "BDU:2016-01652",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2016-01652",
"Impact": "Critical",
"Public": "20160414"
},
{
"ID": "BDU:2016-01664",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01664",
"Impact": "High",
"Public": "20160121"
},
{
"ID": "BDU:2018-00462",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2018-00462",
"Impact": "High",
"Public": "20161229"
}
],
"CVEs": [
{
"ID": "CVE-2015-7981",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-7981",
"Impact": "Low",
"Public": "20151124"
},
{
"ID": "CVE-2015-8126",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8126",
"Impact": "High",
"Public": "20151113"
},
{
"ID": "CVE-2015-8472",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8472",
"Impact": "High",
"Public": "20160121"
},
{
"ID": "CVE-2015-8540",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8540",
"Impact": "High",
"Public": "20160414"
},
{
"ID": "CVE-2016-10087",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10087",
"Impact": "High",
"Public": "20170130"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191318001",
"Comment": "libpng12 is earlier than 0:1.2.59-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191318002",
"Comment": "libpng12-devel is earlier than 0:1.2.59-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191318003",
"Comment": "libpng3 is earlier than 0:1.2.59-alt1"
}
]
}
]
}
}
]
}