2024-06-28 13:17:52 +00:00

303 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182508",
"Version": "oval:org.altlinux.errata:def:20182508",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2508: package `mercurial` update to version 4.7.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2508",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2508",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01771",
"RefURL": "https://bdu.fstec.ru/vul/2017-01771",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02364",
"RefURL": "https://bdu.fstec.ru/vul/2017-02364",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00202",
"RefURL": "https://bdu.fstec.ru/vul/2018-00202",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01497",
"RefURL": "https://bdu.fstec.ru/vul/2018-01497",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01285",
"RefURL": "https://bdu.fstec.ru/vul/2021-01285",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01310",
"RefURL": "https://bdu.fstec.ru/vul/2021-01310",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01311",
"RefURL": "https://bdu.fstec.ru/vul/2021-01311",
"Source": "BDU"
},
{
"RefID": "CVE-2017-1000115",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000115",
"Source": "CVE"
},
{
"RefID": "CVE-2017-1000116",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000116",
"Source": "CVE"
},
{
"RefID": "CVE-2017-17458",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-17458",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9462",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9462",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1000132",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000132",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13346",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13346",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13347",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13347",
"Source": "CVE"
},
{
"RefID": "CVE-2018-13348",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13348",
"Source": "CVE"
},
{
"RefID": "CVE-2018-17983",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17983",
"Source": "CVE"
}
],
"Description": "This update upgrades mercurial to version 4.7.2-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01771: Уязвимость программного средства управления версиями Mercurial, связаная с недостатками разграничения доступа и позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-02364: Уязвимость программного средства управления версиями Mercurial, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю выполнить произвольные команды операционной системы\n\n * BDU:2018-00202: Уязвимость программного средства управления версиями Mercurial, связанная с неприятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-01497: Уязвимость программного средства управления версиями Mercuria, связанная с ошибками управления доступом, позволяющая нарушителю нарушить конфиденциальность и целостность данных\n\n * BDU:2021-01285: Уязвимость компонента mpatch.c программного средства управления версиями Mercuria, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01310: Уязвимость функции mpatch_decode программного средства управления версиями Mercuria, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-01311: Уязвимость функции mpatch_apply программного средства управлениями версиями Mercuria, позволяющая нарушителю оказать воздействие на целостность данных\n\n * CVE-2017-1000115: Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository\n\n * CVE-2017-1000116: Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.\n\n * CVE-2017-17458: In Mercurial before 4.4.1, it is possible that a specially malformed repository can cause Git subrepositories to run arbitrary code in the form of a .git/hooks/post-update script checked into the repository. Typical use of Mercurial prevents construction of such repositories, but they can be created programmatically.\n\n * CVE-2017-9462: In Mercurial before 4.1.3, \"hg serve --stdio\" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name.\n\n * CVE-2018-1000132: Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1.\n\n * CVE-2018-13346: The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004.\n\n * CVE-2018-13347: mpatch.c in Mercurial before 4.6.1 mishandles integer addition and subtraction, aka OVE-20180430-0002.\n\n * CVE-2018-13348: The mpatch_decode function in mpatch.c in Mercurial before 4.6.1 mishandles certain situations where there should be at least 12 bytes remaining after the current position in the patch data, but actually are not, aka OVE-20180430-0001.\n\n * CVE-2018-17983: cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-10-18"
},
"Updated": {
"Date": "2018-10-18"
},
"BDUs": [
{
"ID": "BDU:2017-01771",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2017-01771",
"Impact": "Critical",
"Public": "20170607"
},
{
"ID": "BDU:2017-02364",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-78",
"Href": "https://bdu.fstec.ru/vul/2017-02364",
"Impact": "High",
"Public": "20170924"
},
{
"ID": "BDU:2018-00202",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-78",
"Href": "https://bdu.fstec.ru/vul/2018-00202",
"Impact": "Critical",
"Public": "20171102"
},
{
"ID": "BDU:2018-01497",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2018-01497",
"Impact": "Critical",
"Public": "20180314"
},
{
"ID": "BDU:2021-01285",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2021-01285",
"Impact": "Critical",
"Public": "20180705"
},
{
"ID": "BDU:2021-01310",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01310",
"Impact": "High",
"Public": "20180705"
},
{
"ID": "BDU:2021-01311",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01311",
"Impact": "High",
"Public": "20180705"
}
],
"CVEs": [
{
"ID": "CVE-2017-1000115",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000115",
"Impact": "High",
"Public": "20171005"
},
{
"ID": "CVE-2017-1000116",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-78",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000116",
"Impact": "Critical",
"Public": "20171005"
},
{
"ID": "CVE-2017-17458",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-78",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-17458",
"Impact": "Critical",
"Public": "20171207"
},
{
"ID": "CVE-2017-9462",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9462",
"Impact": "High",
"Public": "20170606"
},
{
"ID": "CVE-2018-1000132",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000132",
"Impact": "Critical",
"Public": "20180314"
},
{
"ID": "CVE-2018-13346",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13346",
"Impact": "High",
"Public": "20180706"
},
{
"ID": "CVE-2018-13347",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13347",
"Impact": "Critical",
"Public": "20180706"
},
{
"ID": "CVE-2018-13348",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13348",
"Impact": "High",
"Public": "20180706"
},
{
"ID": "CVE-2018-17983",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17983",
"Impact": "Critical",
"Public": "20181004"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182508001",
"Comment": "bash-completion-mercurial is earlier than 0:4.7.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182508002",
"Comment": "mercurial is earlier than 0:4.7.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182508003",
"Comment": "mercurial-hgext is earlier than 0:4.7.2-alt1"
}
]
}
]
}
}
]
}