2024-06-28 13:17:52 +00:00

544 lines
31 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20203318",
"Version": "oval:org.altlinux.errata:def:20203318",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-3318: package `python` update to version 2.7.18-alt0.M90P.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-3318",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3318",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01741",
"RefURL": "https://bdu.fstec.ru/vul/2019-01741",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02825",
"RefURL": "https://bdu.fstec.ru/vul/2019-02825",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03643",
"RefURL": "https://bdu.fstec.ru/vul/2019-03643",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00690",
"RefURL": "https://bdu.fstec.ru/vul/2020-00690",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01057",
"RefURL": "https://bdu.fstec.ru/vul/2020-01057",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01347",
"RefURL": "https://bdu.fstec.ru/vul/2020-01347",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04508",
"RefURL": "https://bdu.fstec.ru/vul/2020-04508",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00373",
"RefURL": "https://bdu.fstec.ru/vul/2021-00373",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03607",
"RefURL": "https://bdu.fstec.ru/vul/2021-03607",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03708",
"RefURL": "https://bdu.fstec.ru/vul/2021-03708",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03715",
"RefURL": "https://bdu.fstec.ru/vul/2021-03715",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03740",
"RefURL": "https://bdu.fstec.ru/vul/2021-03740",
"Source": "BDU"
},
{
"RefID": "CVE-2018-20852",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20852",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10160",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15903",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16056",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16056",
"Source": "CVE"
},
{
"RefID": "CVE-2019-16935",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16935",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18348",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18348",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9636",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9636",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9740",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9740",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9947",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9947",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9948",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9948",
"Source": "CVE"
},
{
"RefID": "CVE-2020-8492",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8492",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3426",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3426",
"Source": "CVE"
}
],
"Description": "This update upgrades python to version 2.7.18-alt0.M90P.1. \nSecurity Fix(es):\n\n * BDU:2019-01741: Уязвимость модуля urllib интерпретатора языка программирования Python, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2019-02825: Уязвимость функций urllib.parse.urlsplit и urllib.parse.urlparse интерпретатора языка программирования Python, позволяющая нарушителю раскрыть защищаемую информацию, читать или записывать произвольные данные, или вызвать отказ в обслуживании\n\n * BDU:2019-03643: Уязвимость библиотеки для анализа XML-файлов libexpat, связанная с неверным ограничением xml-ссылок на внешние объекты, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00690: Уязвимость интерпретатора языка программирования Python, связанная с ошибками управления регистрационными данными, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01057: Уязвимость модуля urllib2 интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2020-01347: Уязвимость модуля электронной почты интерпретатора языка программирования Python, позволяющая нарушителю принимать электронные сообщения от адресов электронной почты, которые должны быть отклонены\n\n * BDU:2020-04508: Уязвимость сервера документации XML-RPC интерпретатора языка программирования Python, позволяющая нарушителю осуществить межсайтовую сценарную атаку\n\n * BDU:2021-00373: Уязвимость функции http.cookiejar.DefaultPolicy.domain_return_ok() интерпретатора языка программирования Python, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-03607: Уязвимость модуля urllib2 интерпретатора языка программирования Python, связанная с непринятием мер по нейтрализации последовательностей crlf, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-03708: Уязвимость модуля pandoc языка программирования Python, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-03715: Уязвимость модуля urllib2 языка программирования Python, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2021-03740: Уязвимость интерпретатора языка программирования Python, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-20852: http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.\n\n * CVE-2019-10160: A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.\n\n * CVE-2019-15903: In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.\n\n * CVE-2019-16056: An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.\n\n * CVE-2019-16935: The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.\n\n * CVE-2019-18348: An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.\n\n * CVE-2019-9636: Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.\n\n * CVE-2019-9740: An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.\n\n * CVE-2019-9947: An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.\n\n * CVE-2019-9948: urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.\n\n * CVE-2020-8492: Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.\n\n * CVE-2021-3426: There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-11-16"
},
"Updated": {
"Date": "2020-11-16"
},
"BDUs": [
{
"ID": "BDU:2019-01741",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CWE": "CWE-22, CWE-254",
"Href": "https://bdu.fstec.ru/vul/2019-01741",
"Impact": "Low",
"Public": "20190323"
},
{
"ID": "BDU:2019-02825",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-172, CWE-255",
"Href": "https://bdu.fstec.ru/vul/2019-02825",
"Impact": "Critical",
"Public": "20190607"
},
{
"ID": "BDU:2019-03643",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-611",
"Href": "https://bdu.fstec.ru/vul/2019-03643",
"Impact": "High",
"Public": "20190828"
},
{
"ID": "BDU:2020-00690",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-255",
"Href": "https://bdu.fstec.ru/vul/2020-00690",
"Impact": "High",
"Public": "20190309"
},
{
"ID": "BDU:2020-01057",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-93",
"Href": "https://bdu.fstec.ru/vul/2020-01057",
"Impact": "Low",
"Public": "20190323"
},
{
"ID": "BDU:2020-01347",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01347",
"Impact": "High",
"Public": "20190921"
},
{
"ID": "BDU:2020-04508",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2020-04508",
"Impact": "Low",
"Public": "20190921"
},
{
"ID": "BDU:2021-00373",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00373",
"Impact": "Low",
"Public": "20190713"
},
{
"ID": "BDU:2021-03607",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-93",
"Href": "https://bdu.fstec.ru/vul/2021-03607",
"Impact": "Low",
"Public": "20190313"
},
{
"ID": "BDU:2021-03708",
"CVSS": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-03708",
"Impact": "Low",
"Public": "20210520"
},
{
"ID": "BDU:2021-03715",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-74",
"Href": "https://bdu.fstec.ru/vul/2021-03715",
"Impact": "Low",
"Public": "20191023"
},
{
"ID": "BDU:2021-03740",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2021-03740",
"Impact": "Low",
"Public": "20200911"
}
],
"CVEs": [
{
"ID": "CVE-2018-20852",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20852",
"Impact": "Low",
"Public": "20190713"
},
{
"ID": "CVE-2019-10160",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-172",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10160",
"Impact": "Critical",
"Public": "20190607"
},
{
"ID": "CVE-2019-15903",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
"Impact": "High",
"Public": "20190904"
},
{
"ID": "CVE-2019-16056",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16056",
"Impact": "High",
"Public": "20190906"
},
{
"ID": "CVE-2019-16935",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16935",
"Impact": "Low",
"Public": "20190928"
},
{
"ID": "CVE-2019-18348",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-74",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18348",
"Impact": "Low",
"Public": "20191023"
},
{
"ID": "CVE-2019-9636",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9636",
"Impact": "Critical",
"Public": "20190308"
},
{
"ID": "CVE-2019-9740",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-93",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9740",
"Impact": "Low",
"Public": "20190313"
},
{
"ID": "CVE-2019-9947",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-93",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9947",
"Impact": "Low",
"Public": "20190323"
},
{
"ID": "CVE-2019-9948",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9948",
"Impact": "Critical",
"Public": "20190323"
},
{
"ID": "CVE-2020-8492",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8492",
"Impact": "Low",
"Public": "20200130"
},
{
"ID": "CVE-2021-3426",
"CVSS": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3426",
"Impact": "Low",
"Public": "20210520"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20203318001",
"Comment": "libpython is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318002",
"Comment": "python is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318003",
"Comment": "python-base is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318004",
"Comment": "python-dev is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318005",
"Comment": "python-devel-static is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318006",
"Comment": "python-modules is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318007",
"Comment": "python-modules-bsddb is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318008",
"Comment": "python-modules-compiler is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318009",
"Comment": "python-modules-ctypes is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318010",
"Comment": "python-modules-curses is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318011",
"Comment": "python-modules-distutils is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318012",
"Comment": "python-modules-email is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318013",
"Comment": "python-modules-encodings is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318014",
"Comment": "python-modules-ensurepip is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318015",
"Comment": "python-modules-hotshot is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318016",
"Comment": "python-modules-json is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318017",
"Comment": "python-modules-logging is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318018",
"Comment": "python-modules-multiprocessing is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318019",
"Comment": "python-modules-nis is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318020",
"Comment": "python-modules-sqlite3 is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318021",
"Comment": "python-modules-tkinter is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318022",
"Comment": "python-modules-unittest is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318023",
"Comment": "python-modules-wsgiref is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318024",
"Comment": "python-modules-xml is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318025",
"Comment": "python-relaxed is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318026",
"Comment": "python-strict is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318027",
"Comment": "python-test is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318028",
"Comment": "python-tools-2to3 is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318029",
"Comment": "python-tools-i18n is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318030",
"Comment": "python-tools-idle is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318031",
"Comment": "python-tools-pynche is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318032",
"Comment": "python-tools-scripts is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318033",
"Comment": "python-tools-smtpd is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318034",
"Comment": "python-tools-webchecker is earlier than 0:2.7.18-alt0.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203318035",
"Comment": "python-user-scripts is earlier than 0:2.7.18-alt0.M90P.1"
}
]
}
]
}
}
]
}