2024-12-12 21:07:30 +00:00

331 lines
16 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20212058",
"Version": "oval:org.altlinux.errata:def:20212058",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-2058: package `squid` update to version 4.15-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-2058",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2058",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-01823",
"RefURL": "https://bdu.fstec.ru/vul/2021-01823",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02728",
"RefURL": "https://bdu.fstec.ru/vul/2021-02728",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02729",
"RefURL": "https://bdu.fstec.ru/vul/2021-02729",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02730",
"RefURL": "https://bdu.fstec.ru/vul/2021-02730",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02731",
"RefURL": "https://bdu.fstec.ru/vul/2021-02731",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02732",
"RefURL": "https://bdu.fstec.ru/vul/2021-02732",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05158",
"RefURL": "https://bdu.fstec.ru/vul/2021-05158",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05301",
"RefURL": "https://bdu.fstec.ru/vul/2021-05301",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06197",
"RefURL": "https://bdu.fstec.ru/vul/2021-06197",
"Source": "BDU"
},
{
"RefID": "CVE-2020-25097",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-25097",
"Source": "CVE"
},
{
"RefID": "CVE-2021-28116",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28116",
"Source": "CVE"
},
{
"RefID": "CVE-2021-28651",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28651",
"Source": "CVE"
},
{
"RefID": "CVE-2021-28652",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28652",
"Source": "CVE"
},
{
"RefID": "CVE-2021-28662",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28662",
"Source": "CVE"
},
{
"RefID": "CVE-2021-31806",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-31806",
"Source": "CVE"
},
{
"RefID": "CVE-2021-31807",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-31807",
"Source": "CVE"
},
{
"RefID": "CVE-2021-31808",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-31808",
"Source": "CVE"
},
{
"RefID": "CVE-2021-33620",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33620",
"Source": "CVE"
}
],
"Description": "This update upgrades squid to version 4.15-alt1. \nSecurity Fix(es):\n\n * BDU:2021-01823: Уязвимость реализации конфигурации uri_whitespace прокси-сервера Squid, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)\n\n * BDU:2021-02728: Уязвимость прокси-сервера Squid, существующая из-за недостаточной проверки введенных пользователем данных при доставке ответов на запросы диапазона HTTP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02729: Уязвимость прокси-сервера Squid, существующая из-за недостаточной проверки введенных пользователем данных при выполнении запросов диапазона HTTP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02730: Уязвимость компонента Cache Manager API прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02731: Уязвимость прокси-сервера Squid, существующая из-за недостаточной проверки ввода при обработке ответов HTTP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02732: Уязвимость прокси-сервера Squid, существующая из-за недостаточной проверки ввода при разрешении идентификаторов ресурсов «urn:», позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05158: Уязвимость прокси-сервера Squid, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05301: Уязвимость прокси-сервера Squid, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06197: Уязвимость прокси-сервера Squid, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * CVE-2020-25097: An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.\n\n * CVE-2021-28116: Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody.\n\n * CVE-2021-28651: An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.\n\n * CVE-2021-28652: An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.\n\n * CVE-2021-28662: An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.\n\n * CVE-2021-31806: An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.\n\n * CVE-2021-31807: An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent.\n\n * CVE-2021-31808: An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.\n\n * CVE-2021-33620: Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-06-24"
},
"Updated": {
"Date": "2021-06-24"
},
"BDUs": [
{
"ID": "BDU:2021-01823",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01823",
"Impact": "High",
"Public": "20210312"
},
{
"ID": "BDU:2021-02728",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02728",
"Impact": "Low",
"Public": "20210510"
},
{
"ID": "BDU:2021-02729",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02729",
"Impact": "Low",
"Public": "20210510"
},
{
"ID": "BDU:2021-02730",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2021-02730",
"Impact": "High",
"Public": "20210510"
},
{
"ID": "BDU:2021-02731",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02731",
"Impact": "High",
"Public": "20210510"
},
{
"ID": "BDU:2021-02732",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02732",
"Impact": "High",
"Public": "20210510"
},
{
"ID": "BDU:2021-05158",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2021-05158",
"Impact": "Low",
"Public": "20210524"
},
{
"ID": "BDU:2021-05301",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-05301",
"Impact": "Low",
"Public": "20210528"
},
{
"ID": "BDU:2021-06197",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-06197",
"Impact": "Low",
"Public": "20211004"
}
],
"CVEs": [
{
"ID": "CVE-2020-25097",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-25097",
"Impact": "High",
"Public": "20210319"
},
{
"ID": "CVE-2021-28116",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28116",
"Impact": "Low",
"Public": "20210309"
},
{
"ID": "CVE-2021-28651",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28651",
"Impact": "High",
"Public": "20210527"
},
{
"ID": "CVE-2021-28652",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28652",
"Impact": "Low",
"Public": "20210527"
},
{
"ID": "CVE-2021-28662",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-116",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28662",
"Impact": "Low",
"Public": "20210527"
},
{
"ID": "CVE-2021-31806",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-116",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-31806",
"Impact": "Low",
"Public": "20210527"
},
{
"ID": "CVE-2021-31807",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-31807",
"Impact": "Low",
"Public": "20210608"
},
{
"ID": "CVE-2021-31808",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-31808",
"Impact": "Low",
"Public": "20210527"
},
{
"ID": "CVE-2021-33620",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33620",
"Impact": "Low",
"Public": "20210528"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20212058001",
"Comment": "squid is earlier than 0:4.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212058002",
"Comment": "squid-doc is earlier than 0:4.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212058003",
"Comment": "squid-helpers is earlier than 0:4.15-alt1"
}
]
}
]
}
}
]
}