vuln-list-alt/oval/p11/ALT-PU-2017-2833/definitions.json
2024-12-12 21:07:30 +00:00

455 lines
23 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20172833",
"Version": "oval:org.altlinux.errata:def:20172833",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-2833: package `glibc` update to version 2.26.0.124.98f244e-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-2833",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2833",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01292",
"RefURL": "https://bdu.fstec.ru/vul/2017-01292",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02450",
"RefURL": "https://bdu.fstec.ru/vul/2017-02450",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02451",
"RefURL": "https://bdu.fstec.ru/vul/2017-02451",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00364",
"RefURL": "https://bdu.fstec.ru/vul/2018-00364",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00365",
"RefURL": "https://bdu.fstec.ru/vul/2018-00365",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00415",
"RefURL": "https://bdu.fstec.ru/vul/2018-00415",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04683",
"RefURL": "https://bdu.fstec.ru/vul/2020-04683",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06342",
"RefURL": "https://bdu.fstec.ru/vul/2021-06342",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05945",
"RefURL": "https://bdu.fstec.ru/vul/2022-05945",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05948",
"RefURL": "https://bdu.fstec.ru/vul/2022-05948",
"Source": "BDU"
},
{
"RefID": "CVE-2010-3192",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2010-3192",
"Source": "CVE"
},
{
"RefID": "CVE-2016-10228",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10228",
"Source": "CVE"
},
{
"RefID": "CVE-2017-1000366",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366",
"Source": "CVE"
},
{
"RefID": "CVE-2017-12132",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12132",
"Source": "CVE"
},
{
"RefID": "CVE-2017-12133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12133",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15670",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15670",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15671",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15671",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15804",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15804",
"Source": "CVE"
},
{
"RefID": "CVE-2017-16997",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-16997",
"Source": "CVE"
},
{
"RefID": "CVE-2017-8804",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8804",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1000001",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000001",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6485",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6485",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6551",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6551",
"Source": "CVE"
}
],
"Description": "This update upgrades glibc to version 2.26.0.124.98f244e-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01292: Уязвимость функции xdr_bytes и xdr_string библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-02450: Уязвимость функции glob() библиотеки glob.c, обеспечивающей системные вызовы и основные системные фунции, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-02451: Уязвимость функции glob библиотеки glob.c, обеспечивающей системные вызовы и основные системные фунции glibc, позволяющая нарушителю вызвать аварийное завершение работы приложения\n\n * BDU:2018-00364: Уязвимость реализации функции malloc библиотеки, обеспечивающей системные вызовы и основные фунции glibc, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00365: Уязвимость функции memalign библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00415: Уязвимость функций getcwd и realpath библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04683: Уязвимость утилиты iconv системной библиотеки GNU C Library (glibc), связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06342: Уязвимость функции glob (glob.c) библиотеки GNU C позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05945: Уязвимость функций fillin_rpath, decompose_rpath системной библиотеки GNU C Library, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05948: Уязвимость функции glob компонента glob.c системной библиотеки GNU C Library, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2010-3192: Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.\n\n * CVE-2016-10228: The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.\n\n * CVE-2017-1000366: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.\n\n * CVE-2017-12132: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.\n\n * CVE-2017-12133: Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.\n\n * CVE-2017-15670: The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.\n\n * CVE-2017-15671: The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).\n\n * CVE-2017-15804: The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.\n\n * CVE-2017-16997: elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the \"./\" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.\n\n * CVE-2017-8804: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references\n\n * CVE-2018-1000001: In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.\n\n * CVE-2018-6485: An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.\n\n * CVE-2018-6551: The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-12-26"
},
"Updated": {
"Date": "2017-12-26"
},
"BDUs": [
{
"ID": "BDU:2017-01292",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CWE": "CWE-502",
"Href": "https://bdu.fstec.ru/vul/2017-01292",
"Impact": "High",
"Public": "20170507"
},
{
"ID": "BDU:2017-02450",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-02450",
"Impact": "Critical",
"Public": "20171021"
},
{
"ID": "BDU:2017-02451",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-02451",
"Impact": "Critical",
"Public": "20171019"
},
{
"ID": "BDU:2018-00364",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00364",
"Impact": "Low",
"Public": "20180202"
},
{
"ID": "BDU:2018-00365",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2018-00365",
"Impact": "Critical",
"Public": "20171024"
},
{
"ID": "BDU:2018-00415",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00415",
"Impact": "High",
"Public": "20180107"
},
{
"ID": "BDU:2020-04683",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04683",
"Impact": "Low",
"Public": "20200827"
},
{
"ID": "BDU:2021-06342",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-06342",
"Impact": "Critical",
"Public": "20171022"
},
{
"ID": "BDU:2022-05945",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-426",
"Href": "https://bdu.fstec.ru/vul/2022-05945",
"Impact": "High",
"Public": "20171217"
},
{
"ID": "BDU:2022-05948",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://bdu.fstec.ru/vul/2022-05948",
"Impact": "Low",
"Public": "20171020"
}
],
"CVEs": [
{
"ID": "CVE-2010-3192",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2010-3192",
"Impact": "Low",
"Public": "20101014"
},
{
"ID": "CVE-2016-10228",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10228",
"Impact": "Low",
"Public": "20170302"
},
{
"ID": "CVE-2017-1000366",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366",
"Impact": "High",
"Public": "20170619"
},
{
"ID": "CVE-2017-12132",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12132",
"Impact": "Low",
"Public": "20170801"
},
{
"ID": "CVE-2017-12133",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12133",
"Impact": "Low",
"Public": "20170907"
},
{
"ID": "CVE-2017-15670",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15670",
"Impact": "Critical",
"Public": "20171020"
},
{
"ID": "CVE-2017-15671",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15671",
"Impact": "Low",
"Public": "20171020"
},
{
"ID": "CVE-2017-15804",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15804",
"Impact": "Critical",
"Public": "20171022"
},
{
"ID": "CVE-2017-16997",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-426",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-16997",
"Impact": "High",
"Public": "20171218"
},
{
"ID": "CVE-2017-8804",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8804",
"Impact": "High",
"Public": "20170507"
},
{
"ID": "CVE-2018-1000001",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000001",
"Impact": "High",
"Public": "20180131"
},
{
"ID": "CVE-2018-6485",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6485",
"Impact": "Critical",
"Public": "20180201"
},
{
"ID": "CVE-2018-6551",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6551",
"Impact": "Critical",
"Public": "20180202"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20172833001",
"Comment": "glibc is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833002",
"Comment": "glibc-core is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833003",
"Comment": "glibc-debug is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833004",
"Comment": "glibc-devel is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833005",
"Comment": "glibc-devel-static is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833006",
"Comment": "glibc-doc is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833007",
"Comment": "glibc-gconv-modules is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833008",
"Comment": "glibc-i18ndata is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833009",
"Comment": "glibc-locales is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833010",
"Comment": "glibc-nss is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833011",
"Comment": "glibc-preinstall is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833012",
"Comment": "glibc-pthread is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833013",
"Comment": "glibc-source is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833014",
"Comment": "glibc-timezones is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833015",
"Comment": "glibc-utils is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833016",
"Comment": "iconv is earlier than 6:2.26.0.124.98f244e-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172833017",
"Comment": "nscd is earlier than 6:2.26.0.124.98f244e-alt1"
}
]
}
]
}
}
]
}