vuln-list-alt/oval/c9f2/ALT-PU-2017-2003/definitions.json
2024-06-28 13:17:52 +00:00

219 lines
9.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20172003",
"Version": "oval:org.altlinux.errata:def:20172003",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-2003: package `elfutils` update to version 0.170-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-2003",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2003",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01631",
"RefURL": "https://bdu.fstec.ru/vul/2019-01631",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01633",
"RefURL": "https://bdu.fstec.ru/vul/2019-01633",
"Source": "BDU"
},
{
"RefID": "CVE-2017-7607",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7607",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7608",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7608",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7609",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7609",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7610",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7610",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7611",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7611",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7612",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7612",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7613",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7613",
"Source": "CVE"
}
],
"Description": "This update upgrades elfutils to version 0.170-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01631: Уязвимость библиотеки elflint.c утилиты для модификации и анализа бинарных файлов ELF Elfutils, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01633: Уязвимость функции check_group библиотеки elflint.c утилиты для модификации и анализа бинарных файлов ELF Elfutils, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-7607: The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.\n\n * CVE-2017-7608: The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.\n\n * CVE-2017-7609: elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.\n\n * CVE-2017-7610: The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.\n\n * CVE-2017-7611: The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.\n\n * CVE-2017-7612: The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.\n\n * CVE-2017-7613: elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-08-08"
},
"Updated": {
"Date": "2017-08-08"
},
"BDUs": [
{
"ID": "BDU:2019-01631",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-01631",
"Impact": "Low",
"Public": "20170327"
},
{
"ID": "BDU:2019-01633",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-01633",
"Impact": "Low",
"Public": "20171013"
}
],
"CVEs": [
{
"ID": "CVE-2017-7607",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7607",
"Impact": "Low",
"Public": "20170409"
},
{
"ID": "CVE-2017-7608",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7608",
"Impact": "Low",
"Public": "20170409"
},
{
"ID": "CVE-2017-7609",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7609",
"Impact": "Low",
"Public": "20170409"
},
{
"ID": "CVE-2017-7610",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7610",
"Impact": "Low",
"Public": "20170409"
},
{
"ID": "CVE-2017-7611",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7611",
"Impact": "Low",
"Public": "20170409"
},
{
"ID": "CVE-2017-7612",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7612",
"Impact": "Low",
"Public": "20170409"
},
{
"ID": "CVE-2017-7613",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7613",
"Impact": "Low",
"Public": "20170409"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20172003001",
"Comment": "elfutils is earlier than 0:0.170-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172003002",
"Comment": "elfutils-devel is earlier than 0:0.170-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172003003",
"Comment": "elfutils-devel-static is earlier than 0:0.170-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172003004",
"Comment": "libelf is earlier than 0:0.170-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172003005",
"Comment": "libelf-devel is earlier than 0:0.170-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172003006",
"Comment": "libelf-devel-static is earlier than 0:0.170-alt1"
}
]
}
]
}
}
]
}