199 lines
9.1 KiB
JSON
199 lines
9.1 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20181722",
|
||
"Version": "oval:org.altlinux.errata:def:20181722",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-1722: package `jackson-databind` update to version 2.9.4-alt1_3jpp8",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-1722",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1722",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04797",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04797",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01382",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01382",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01394",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01394",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-15095",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-17485",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-7525",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5968",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5968",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades jackson-databind to version 2.9.4-alt1_3jpp8. \nSecurity Fix(es):\n\n * BDU:2019-04797: Уязвимость библиотеки Jackson-databind, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-01382: Уязвимость метода readValue класса ObjectMapper библиотеки Jackson-databind, связанная с восстановлением в памяти недостоверной структуры данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01394: Уязвимость метода readValue класса ObjectMapper библиотеки Jackson-databind, связанная с восстановлением в памяти недостоверной структуры данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2017-15095: A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.\n\n * CVE-2017-17485: FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.\n\n * CVE-2017-7525: A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.\n\n * CVE-2018-5968: FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-05-16"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-05-16"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-04797",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-184, CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04797",
|
||
"Impact": "High",
|
||
"Public": "20180121"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01382",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01382",
|
||
"Impact": "Critical",
|
||
"Public": "20171210"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01394",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01394",
|
||
"Impact": "Critical",
|
||
"Public": "20170405"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2017-15095",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095",
|
||
"Impact": "Critical",
|
||
"Public": "20180206"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-17485",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-502",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485",
|
||
"Impact": "Critical",
|
||
"Public": "20180110"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-7525",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-184",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525",
|
||
"Impact": "Critical",
|
||
"Public": "20180206"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5968",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-184",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5968",
|
||
"Impact": "High",
|
||
"Public": "20180122"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181722001",
|
||
"Comment": "jackson-databind is earlier than 0:2.9.4-alt1_3jpp8"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181722002",
|
||
"Comment": "jackson-databind-javadoc is earlier than 0:2.9.4-alt1_3jpp8"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |