vuln-list-alt/oval/p11/ALT-PU-2021-1651/definitions.json
2024-12-12 21:07:30 +00:00

126 lines
4.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211651",
"Version": "oval:org.altlinux.errata:def:20211651",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1651: package `tar` update to version 1.34.0.13.66b59fcc-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1651",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1651",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-02357",
"RefURL": "https://bdu.fstec.ru/vul/2021-02357",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00577",
"RefURL": "https://bdu.fstec.ru/vul/2023-00577",
"Source": "BDU"
},
{
"RefID": "CVE-2021-20193",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-20193",
"Source": "CVE"
},
{
"RefID": "CVE-2022-48303",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-48303",
"Source": "CVE"
}
],
"Description": "This update upgrades tar to version 1.34.0.13.66b59fcc-alt1. \nSecurity Fix(es):\n\n * BDU:2021-02357: Уязвимость реализации функции read_header() архиватора GNU Tar, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00577: Уязвимость функции from_header (list.c) архиватора GNU Tar, связанная с чтением за пределами памяти, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * CVE-2021-20193: A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.\n\n * CVE-2022-48303: GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-04-14"
},
"Updated": {
"Date": "2021-04-14"
},
"BDUs": [
{
"ID": "BDU:2021-02357",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125, CWE-401",
"Href": "https://bdu.fstec.ru/vul/2021-02357",
"Impact": "Low",
"Public": "20210117"
},
{
"ID": "BDU:2023-00577",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2023-00577",
"Impact": "Low",
"Public": "20230129"
}
],
"CVEs": [
{
"ID": "CVE-2021-20193",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-20193",
"Impact": "Low",
"Public": "20210326"
},
{
"ID": "CVE-2022-48303",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-48303",
"Impact": "Low",
"Public": "20230130"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211651001",
"Comment": "tar is earlier than 0:1.34.0.13.66b59fcc-alt1"
}
]
}
]
}
}
]
}