vuln-list-alt/oval/p11/ALT-PU-2022-2955/definitions.json
2024-12-12 21:07:30 +00:00

102 lines
3.6 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222955",
"Version": "oval:org.altlinux.errata:def:20222955",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2955: package `wolfssl` update to version 5.5.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2955",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2955",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-00042",
"RefURL": "https://bdu.fstec.ru/vul/2023-00042",
"Source": "BDU"
},
{
"RefID": "CVE-2022-42905",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-42905",
"Source": "CVE"
}
],
"Description": "This update upgrades wolfssl to version 5.5.2-alt1. \nSecurity Fix(es):\n\n * BDU:2023-00042: Уязвимость библиотеки SSL/TLS WolfSSL связана с возможностью чтения за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * CVE-2022-42905: In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-10-29"
},
"Updated": {
"Date": "2022-10-29"
},
"BDUs": [
{
"ID": "BDU:2023-00042",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-00042",
"Impact": "Critical",
"Public": "20221106"
}
],
"CVEs": [
{
"ID": "CVE-2022-42905",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-42905",
"Impact": "Critical",
"Public": "20221107"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222955001",
"Comment": "libwolfssl-devel is earlier than 0:5.5.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222955002",
"Comment": "libwolfssl35 is earlier than 0:5.5.2-alt1"
}
]
}
]
}
}
]
}