2024-06-28 13:17:52 +00:00

125 lines
4.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20212534",
"Version": "oval:org.altlinux.errata:def:20212534",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-2534: package `postgresql12-1C` update to version 12.7-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-2534",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2534",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-04174",
"RefURL": "https://bdu.fstec.ru/vul/2021-04174",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3677",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3677",
"Source": "CVE"
}
],
"Description": "This update upgrades postgresql12-1C to version 12.7-alt2. \nSecurity Fix(es):\n\n * BDU:2021-04174: Уязвимость системы управления базами данных PostgreSQL, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * CVE-2021-3677: A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-08-16"
},
"Updated": {
"Date": "2021-08-16"
},
"BDUs": [
{
"ID": "BDU:2021-04174",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://bdu.fstec.ru/vul/2021-04174",
"Impact": "Critical",
"Public": "20210812"
}
],
"CVEs": [
{
"ID": "CVE-2021-3677",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3677",
"Impact": "Low",
"Public": "20220302"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20212534001",
"Comment": "postgresql12-1C is earlier than 0:12.7-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212534002",
"Comment": "postgresql12-1C-contrib is earlier than 0:12.7-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212534003",
"Comment": "postgresql12-1C-docs is earlier than 0:12.7-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212534004",
"Comment": "postgresql12-1C-perl is earlier than 0:12.7-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212534005",
"Comment": "postgresql12-1C-python is earlier than 0:12.7-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212534006",
"Comment": "postgresql12-1C-server is earlier than 0:12.7-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212534007",
"Comment": "postgresql12-1C-tcl is earlier than 0:12.7-alt2"
}
]
}
]
}
}
]
}