vuln-list-alt/oval/c9f2/ALT-PU-2024-8406/definitions.json
2024-05-28 15:02:25 +00:00

127 lines
5.2 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20248406",
"Version": "oval:org.altlinux.errata:def:20248406",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-8406: package `suricata` update to version 6.0.19-alt0.c9f2.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-8406",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-8406",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-06800",
"RefURL": "https://bdu.fstec.ru/vul/2023-06800",
"Source": "BDU"
},
{
"RefID": "BDU:2023-06802",
"RefURL": "https://bdu.fstec.ru/vul/2023-06802",
"Source": "BDU"
},
{
"RefID": "CVE-2023-35852",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35852",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35853",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35853",
"Source": "CVE"
}
],
"Description": "This update upgrades suricata to version 6.0.19-alt0.c9f2.1. \nSecurity Fix(es):\n\n * BDU:2023-06800: Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю записывать произвольные файлы в файловую систему\n\n * BDU:2023-06802: Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2023-35852: In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.\n\n * CVE-2023-35853: In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-05-28"
},
"Updated": {
"Date": "2024-05-28"
},
"BDUs": [
{
"ID": "BDU:2023-06800",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2023-06800",
"Impact": "High",
"Public": "20230614"
},
{
"ID": "BDU:2023-06802",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2023-06802",
"Impact": "Critical",
"Public": "20230614"
}
],
"CVEs": [
{
"ID": "CVE-2023-35852",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35852",
"Impact": "High",
"Public": "20230619"
},
{
"ID": "CVE-2023-35853",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35853",
"Impact": "Critical",
"Public": "20230619"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20248406001",
"Comment": "suricata is earlier than 0:6.0.19-alt0.c9f2.1"
}
]
}
]
}
}
]
}