vuln-list-alt/oval/p10/ALT-PU-2019-1290/definitions.json
2024-06-28 13:17:52 +00:00

201 lines
9.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191290",
"Version": "oval:org.altlinux.errata:def:20191290",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1290: package `bind` update to version 9.11.5.P4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1290",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1290",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-00612",
"RefURL": "https://bdu.fstec.ru/vul/2020-00612",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00773",
"RefURL": "https://bdu.fstec.ru/vul/2020-00773",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00777",
"RefURL": "https://bdu.fstec.ru/vul/2020-00777",
"Source": "BDU"
},
{
"RefID": "CVE-2018-5744",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5744",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5745",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5745",
"Source": "CVE"
},
{
"RefID": "CVE-2019-6465",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6465",
"Source": "CVE"
}
],
"Description": "This update upgrades bind to version 9.11.5.P4-alt1. \nSecurity Fix(es):\n\n * BDU:2020-00612: Уязвимость сервера DNS BIND, связанная с ошибкой управления передачей данных к динамическим зонам (DLZ), позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-00773: Уязвимость функции managed-keys сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00777: Уязвимость сервера DNS BIND, связанная с некорректной обработкой сообщений, имеющих определенную комбинацию опций EDNS, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-5744: A failure to free memory can occur when processing messages having a specific combination of EDNS options. Versions affected are: BIND 9.10.7 -\u003e 9.10.8-P1, 9.11.3 -\u003e 9.11.5-P1, 9.12.0 -\u003e 9.12.3-P1, and versions 9.10.7-S1 -\u003e 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -\u003e 9.13.6 of the 9.13 development branch are also affected.\n\n * CVE-2018-5745: \"managed-keys\" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -\u003e 9.10.8-P1, 9.11.0 -\u003e 9.11.5-P1, 9.12.0 -\u003e 9.12.3-P1, and versions 9.9.3-S1 -\u003e 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -\u003e 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.\n\n * CVE-2019-6465: Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -\u003e 9.10.8-P1, 9.11.0 -\u003e 9.11.5-P2, 9.12.0 -\u003e 9.12.3-P2, and versions 9.9.3-S1 -\u003e 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -\u003e 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-02-22"
},
"Updated": {
"Date": "2019-02-22"
},
"BDUs": [
{
"ID": "BDU:2020-00612",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-00612",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "BDU:2020-00773",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-327",
"Href": "https://bdu.fstec.ru/vul/2020-00773",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "BDU:2020-00777",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-00777",
"Impact": "High",
"Public": "20190221"
}
],
"CVEs": [
{
"ID": "CVE-2018-5744",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5744",
"Impact": "High",
"Public": "20191009"
},
{
"ID": "CVE-2018-5745",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-327",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5745",
"Impact": "Low",
"Public": "20191009"
},
{
"ID": "CVE-2019-6465",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6465",
"Impact": "Low",
"Public": "20191009"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191290001",
"Comment": "bind is earlier than 0:9.11.5.P4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191290002",
"Comment": "bind-devel is earlier than 0:9.11.5.P4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191290003",
"Comment": "bind-doc is earlier than 0:9.11.5.P4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191290004",
"Comment": "bind-utils is earlier than 0:9.11.5.P4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191290005",
"Comment": "libbind is earlier than 0:9.11.5.P4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191290006",
"Comment": "lwresd is earlier than 0:9.11.5.P4-alt1"
}
]
}
]
}
}
]
}