2024-12-12 21:07:30 +00:00

125 lines
4.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221621",
"Version": "oval:org.altlinux.errata:def:20221621",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1621: package `dotnet-bootstrap-6.0` update to version 6.0.3-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1621",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1621",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-05515",
"RefURL": "https://bdu.fstec.ru/vul/2022-05515",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05516",
"RefURL": "https://bdu.fstec.ru/vul/2022-05516",
"Source": "BDU"
},
{
"RefID": "CVE-2022-24464",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24464",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24512",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24512",
"Source": "CVE"
}
],
"Description": "This update upgrades dotnet-bootstrap-6.0 to version 6.0.3-alt1. \nSecurity Fix(es):\n\n * BDU:2022-05515: Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05516: Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2022-24464: .NET and Visual Studio Denial of Service Vulnerability\n\n * CVE-2022-24512: .NET and Visual Studio Remote Code Execution Vulnerability",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-04-03"
},
"Updated": {
"Date": "2022-04-03"
},
"BDUs": [
{
"ID": "BDU:2022-05515",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2022-05515",
"Impact": "High",
"Public": "20220510"
},
{
"ID": "BDU:2022-05516",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-05516",
"Impact": "Low",
"Public": "20220510"
}
],
"CVEs": [
{
"ID": "CVE-2022-24464",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24464",
"Impact": "Low",
"Public": "20220309"
},
{
"ID": "CVE-2022-24512",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24512",
"Impact": "Low",
"Public": "20220309"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221621001",
"Comment": "dotnet-bootstrap-6.0 is earlier than 0:6.0.3-alt1"
}
]
}
]
}
}
]
}