vuln-list-alt/oval/p11/ALT-PU-2017-1240/definitions.json
2024-12-12 21:07:30 +00:00

648 lines
33 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171240",
"Version": "oval:org.altlinux.errata:def:20171240",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1240: package `libxml2` update to version 2.9.4.0.12.e905-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1240",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1240",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-00572",
"RefURL": "https://bdu.fstec.ru/vul/2016-00572",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00846",
"RefURL": "https://bdu.fstec.ru/vul/2016-00846",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01376",
"RefURL": "https://bdu.fstec.ru/vul/2016-01376",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01377",
"RefURL": "https://bdu.fstec.ru/vul/2016-01377",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01378",
"RefURL": "https://bdu.fstec.ru/vul/2016-01378",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01379",
"RefURL": "https://bdu.fstec.ru/vul/2016-01379",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01380",
"RefURL": "https://bdu.fstec.ru/vul/2016-01380",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01381",
"RefURL": "https://bdu.fstec.ru/vul/2016-01381",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01382",
"RefURL": "https://bdu.fstec.ru/vul/2016-01382",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01383",
"RefURL": "https://bdu.fstec.ru/vul/2016-01383",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01650",
"RefURL": "https://bdu.fstec.ru/vul/2016-01650",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00090",
"RefURL": "https://bdu.fstec.ru/vul/2018-00090",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01270",
"RefURL": "https://bdu.fstec.ru/vul/2018-01270",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01271",
"RefURL": "https://bdu.fstec.ru/vul/2018-01271",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01272",
"RefURL": "https://bdu.fstec.ru/vul/2018-01272",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00235",
"RefURL": "https://bdu.fstec.ru/vul/2019-00235",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03125",
"RefURL": "https://bdu.fstec.ru/vul/2021-03125",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00219",
"RefURL": "https://bdu.fstec.ru/vul/2023-00219",
"Source": "BDU"
},
{
"RefID": "CVE-2015-8806",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8806",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1762",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1762",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1833",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1833",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1834",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1834",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1835",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1835",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1836",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1836",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1837",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1837",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1838",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1838",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1839",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1839",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1840",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1840",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2073",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2073",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3627",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3627",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3705",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3705",
"Source": "CVE"
},
{
"RefID": "CVE-2016-4449",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4449",
"Source": "CVE"
},
{
"RefID": "CVE-2016-4483",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4483",
"Source": "CVE"
},
{
"RefID": "CVE-2016-4658",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4658",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5131",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131",
"Source": "CVE"
},
{
"RefID": "CVE-2016-9596",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9596",
"Source": "CVE"
},
{
"RefID": "CVE-2016-9598",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9598",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16931",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16931",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16932",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7375",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7375",
"Source": "CVE"
}
],
"Description": "This update upgrades libxml2 to version 2.9.4.0.12.e905-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00572: Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00846: Уязвимость браузера Safari, операционных систем Mac OS X и iOS, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01376: Уязвимость операционных систем iOS и Mac OS X, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01377: Уязвимость операционных систем iOS и Mac OS X, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01378: Уязвимость операционных систем iOS и Mac OS X, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01379: Уязвимость операционных систем iOS и Mac OS X, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01380: Уязвимость операционных систем iOS и Mac OS X, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01381: Уязвимость операционных систем iOS и Mac OS X, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01382: Уязвимость операционных систем iOS и Mac OS X, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01383: Уязвимость операционных систем iOS и Mac OS X, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01650: Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00090: Уязвимость макроса NEXTL парсера xml-файлов (parser.c) библиотеки libxml2, позволяющая нарушителю внедрить XML-сущности\n\n * BDU:2018-01270: Уязвимость функций xmlParserEntityCheck и xmlParseAttValueComplex библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-01271: Уязвимость функции xmlStringGetNodeList библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-01272: Уязвимость функции xmlStringLenDecodeEntities (parser.c) библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании или раскрыть защищаемую информацию\n\n * BDU:2019-00235: Уязвимость компонента xmlParsePEReference библиотеки для работы с XML и HTML файлами libxml2, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-03125: Уязвимость библиотеки libxml2 операционных систем iPhoneOS, tvOS, watchOS, macOS, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-00219: Уязвимость компонента parser.c библиотеки Libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2015-8806: dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"\u003c!DOCTYPE html\" substring in a crafted HTML document.\n\n * CVE-2016-1762: The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.\n\n * CVE-2016-1833: The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.\n\n * CVE-2016-1834: Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.\n\n * CVE-2016-1835: Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.\n\n * CVE-2016-1836: Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.\n\n * CVE-2016-1837: Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.\n\n * CVE-2016-1838: The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.\n\n * CVE-2016-1839: The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.\n\n * CVE-2016-1840: Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.\n\n * CVE-2016-2073: The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.\n\n * CVE-2016-3627: The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.\n\n * CVE-2016-3705: The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.\n\n * CVE-2016-4449: XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.\n\n * CVE-2016-4483: The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.\n\n * CVE-2016-4658: xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.\n\n * CVE-2016-5131: Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.\n\n * CVE-2016-9596: libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.\n\n * CVE-2016-9598: libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2016-4483.\n\n * CVE-2017-16931: parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name.\n\n * CVE-2017-16932: parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.\n\n * CVE-2017-7375: A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-03-03"
},
"Updated": {
"Date": "2017-03-03"
},
"BDUs": [
{
"ID": "BDU:2016-00572",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00572",
"Impact": "Low",
"Public": "20160212"
},
{
"ID": "BDU:2016-00846",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00846",
"Impact": "Critical",
"Public": "20160324"
},
{
"ID": "BDU:2016-01376",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01376",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "BDU:2016-01377",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01377",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "BDU:2016-01378",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01378",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "BDU:2016-01379",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01379",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "BDU:2016-01380",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01380",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "BDU:2016-01381",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01381",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "BDU:2016-01382",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01382",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "BDU:2016-01383",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01383",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "BDU:2016-01650",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01650",
"Impact": "Low",
"Public": "20160413"
},
{
"ID": "BDU:2018-00090",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00090",
"Impact": "Critical",
"Public": "20171105"
},
{
"ID": "BDU:2018-01270",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-674",
"Href": "https://bdu.fstec.ru/vul/2018-01270",
"Impact": "High",
"Public": "20160517"
},
{
"ID": "BDU:2018-01271",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-674",
"Href": "https://bdu.fstec.ru/vul/2018-01271",
"Impact": "High",
"Public": "20160517"
},
{
"ID": "BDU:2018-01272",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-20, CWE-611",
"Href": "https://bdu.fstec.ru/vul/2018-01272",
"Impact": "High",
"Public": "20160609"
},
{
"ID": "BDU:2019-00235",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-611",
"Href": "https://bdu.fstec.ru/vul/2019-00235",
"Impact": "Critical",
"Public": "20170417"
},
{
"ID": "BDU:2021-03125",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-03125",
"Impact": "Critical",
"Public": "20160925"
},
{
"ID": "BDU:2023-00219",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2023-00219",
"Impact": "High",
"Public": "20170904"
}
],
"CVEs": [
{
"ID": "CVE-2015-8806",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8806",
"Impact": "High",
"Public": "20160413"
},
{
"ID": "CVE-2016-1762",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1762",
"Impact": "High",
"Public": "20160324"
},
{
"ID": "CVE-2016-1833",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1833",
"Impact": "Low",
"Public": "20160520"
},
{
"ID": "CVE-2016-1834",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1834",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "CVE-2016-1835",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1835",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "CVE-2016-1836",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1836",
"Impact": "Low",
"Public": "20160520"
},
{
"ID": "CVE-2016-1837",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1837",
"Impact": "Low",
"Public": "20160520"
},
{
"ID": "CVE-2016-1838",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1838",
"Impact": "Low",
"Public": "20160520"
},
{
"ID": "CVE-2016-1839",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1839",
"Impact": "Low",
"Public": "20160520"
},
{
"ID": "CVE-2016-1840",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1840",
"Impact": "High",
"Public": "20160520"
},
{
"ID": "CVE-2016-2073",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2073",
"Impact": "Low",
"Public": "20160212"
},
{
"ID": "CVE-2016-3627",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-674",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3627",
"Impact": "High",
"Public": "20160517"
},
{
"ID": "CVE-2016-3705",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3705",
"Impact": "High",
"Public": "20160517"
},
{
"ID": "CVE-2016-4449",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4449",
"Impact": "High",
"Public": "20160609"
},
{
"ID": "CVE-2016-4483",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4483",
"Impact": "High",
"Public": "20170411"
},
{
"ID": "CVE-2016-4658",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4658",
"Impact": "Critical",
"Public": "20160925"
},
{
"ID": "CVE-2016-5131",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131",
"Impact": "High",
"Public": "20160723"
},
{
"ID": "CVE-2016-9596",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9596",
"Impact": "Low",
"Public": "20180816"
},
{
"ID": "CVE-2016-9598",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9598",
"Impact": "Low",
"Public": "20180816"
},
{
"ID": "CVE-2017-16931",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16931",
"Impact": "Critical",
"Public": "20171123"
},
{
"ID": "CVE-2017-16932",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932",
"Impact": "High",
"Public": "20171123"
},
{
"ID": "CVE-2017-7375",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-611",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7375",
"Impact": "Critical",
"Public": "20180219"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171240001",
"Comment": "libxml2 is earlier than 1:2.9.4.0.12.e905-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171240002",
"Comment": "libxml2-devel is earlier than 1:2.9.4.0.12.e905-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171240003",
"Comment": "libxml2-doc is earlier than 1:2.9.4.0.12.e905-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171240004",
"Comment": "python-module-libxml2 is earlier than 1:2.9.4.0.12.e905-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171240005",
"Comment": "python3-module-libxml2 is earlier than 1:2.9.4.0.12.e905-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171240006",
"Comment": "xml-utils is earlier than 1:2.9.4.0.12.e905-alt1"
}
]
}
]
}
}
]
}