104 lines
3.7 KiB
JSON
104 lines
3.7 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:202414888",
|
|
"Version": "oval:org.altlinux.errata:def:202414888",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2024-14888: package `libppd` update to version 2.1.0-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p11"
|
|
],
|
|
"Products": [
|
|
"ALT Container"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2024-14888",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-14888",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2024-07645",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2024-07645",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2024-47175",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades libppd to version 2.1.0-alt1. \nSecurity Fix(es):\n\n * BDU:2024-07645: Уязвимость функции ppdCreatePPDFromIPP2 библиотеки libppd сервера печати CUPS, позволяющая нарушителю записывать произвольные данные\n\n * CVE-2024-47175: CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Low",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2024-10-30"
|
|
},
|
|
"Updated": {
|
|
"Date": "2024-10-30"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2024-07645",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:N/I:C/A:N",
|
|
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
|
|
"CWE": "CWE-77",
|
|
"Href": "https://bdu.fstec.ru/vul/2024-07645",
|
|
"Impact": "Low",
|
|
"Public": "20240926"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2024-47175",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175",
|
|
"Impact": "None",
|
|
"Public": "20240926"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:container:11"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:202414888001",
|
|
"Comment": "libppd-devel is earlier than 0:2.1.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:202414888002",
|
|
"Comment": "libppd-tools is earlier than 0:2.1.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:202414888003",
|
|
"Comment": "libppd2 is earlier than 0:2.1.0-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |