2024-12-12 21:07:30 +00:00

214 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20236858",
"Version": "oval:org.altlinux.errata:def:20236858",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-6858: package `node` update to version 18.18.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-6858",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-6858",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-04953",
"RefURL": "https://bdu.fstec.ru/vul/2023-04953",
"Source": "BDU"
},
{
"RefID": "BDU:2023-04954",
"RefURL": "https://bdu.fstec.ru/vul/2023-04954",
"Source": "BDU"
},
{
"RefID": "BDU:2023-04955",
"RefURL": "https://bdu.fstec.ru/vul/2023-04955",
"Source": "BDU"
},
{
"RefID": "BDU:2023-06559",
"RefURL": "https://bdu.fstec.ru/vul/2023-06559",
"Source": "BDU"
},
{
"RefID": "BDU:2023-07176",
"RefURL": "https://bdu.fstec.ru/vul/2023-07176",
"Source": "BDU"
},
{
"RefID": "CVE-2023-32002",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32006",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32559",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559",
"Source": "CVE"
},
{
"RefID": "CVE-2023-38552",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-38552",
"Source": "CVE"
},
{
"RefID": "CVE-2023-44487",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"Source": "CVE"
}
],
"Description": "This update upgrades node to version 18.18.2-alt1. \nSecurity Fix(es):\n\n * BDU:2023-04953: Уязвимость модуля Module._load() программной платформы Node.js, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2023-04954: Уязвимость модуля module.constructor.createRequire() программной платформы Node.js, позволяющая нарушителю обойти введенные ограничения безопасности\n\n * BDU:2023-04955: Уязвимость модуля process.binding() программной платформы Node.js, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2023-06559: Уязвимость реализации протокола HTTP/2, связанная с возможностью формирования потока запросов в рамках уже установленного сетевого соединения, без открытия новых сетевых соединений и без подтверждения получения пакетов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-07176: Уязвимость программной платформы Node.js, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю отключить проверку целостности\n\n * CVE-2023-32002: The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.\n\n * CVE-2023-32006: The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.\n\n * CVE-2023-32559: A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.\n\n * CVE-2023-38552: When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check.\nImpacts:\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x.\nPlease note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.\n\n * CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-11-02"
},
"Updated": {
"Date": "2023-11-02"
},
"BDUs": [
{
"ID": "BDU:2023-04953",
"CVSS": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2023-04953",
"Impact": "High",
"Public": "20230809"
},
{
"ID": "BDU:2023-04954",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2023-04954",
"Impact": "Low",
"Public": "20230809"
},
{
"ID": "BDU:2023-04955",
"CVSS": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2023-04955",
"Impact": "High",
"Public": "20230809"
},
{
"ID": "BDU:2023-06559",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2023-06559",
"Impact": "High",
"Public": "20231010"
},
{
"ID": "BDU:2023-07176",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-345",
"Href": "https://bdu.fstec.ru/vul/2023-07176",
"Impact": "High",
"Public": "20231017"
}
],
"CVEs": [
{
"ID": "CVE-2023-32002",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002",
"Impact": "Critical",
"Public": "20230821"
},
{
"ID": "CVE-2023-32006",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006",
"Impact": "High",
"Public": "20230815"
},
{
"ID": "CVE-2023-32559",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559",
"Impact": "High",
"Public": "20230824"
},
{
"ID": "CVE-2023-38552",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-345",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-38552",
"Impact": "High",
"Public": "20231018"
},
{
"ID": "CVE-2023-44487",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"Impact": "High",
"Public": "20231010"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20236858001",
"Comment": "node is earlier than 0:18.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20236858002",
"Comment": "node-devel is earlier than 0:18.18.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20236858003",
"Comment": "node-doc is earlier than 0:18.18.2-alt1"
}
]
}
]
}
}
]
}