vuln-list-alt/oval/p11/ALT-PU-2020-1651/definitions.json
2024-12-12 21:07:30 +00:00

111 lines
4.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20201651",
"Version": "oval:org.altlinux.errata:def:20201651",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-1651: package `lxc` update to version 4.0.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-1651",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1651",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-00826",
"RefURL": "https://bdu.fstec.ru/vul/2019-00826",
"Source": "BDU"
},
{
"RefID": "CVE-2019-5736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5736",
"Source": "CVE"
}
],
"Description": "This update upgrades lxc to version 4.0.0-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00826: Уязвимость инструмента для запуска изолированных контейнеров runc, связанная с ошибками обработки файлового дескриптора, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2019-5736: runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-04-01"
},
"Updated": {
"Date": "2020-04-01"
},
"BDUs": [
{
"ID": "BDU:2019-00826",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-216",
"Href": "https://bdu.fstec.ru/vul/2019-00826",
"Impact": "High",
"Public": "20190211"
}
],
"CVEs": [
{
"ID": "CVE-2019-5736",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-78",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5736",
"Impact": "High",
"Public": "20190211"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20201651001",
"Comment": "lxc is earlier than 0:4.0.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201651002",
"Comment": "lxc-devel is earlier than 0:4.0.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201651003",
"Comment": "lxc-libs is earlier than 0:4.0.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201651004",
"Comment": "pam0_cgfs is earlier than 0:4.0.0-alt1"
}
]
}
]
}
}
]
}