2024-06-28 13:17:52 +00:00

215 lines
9.4 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20172216",
"Version": "oval:org.altlinux.errata:def:20172216",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-2216: package `ruby` update to version 2.4.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-2216",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2216",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01780",
"RefURL": "https://bdu.fstec.ru/vul/2017-01780",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02182",
"RefURL": "https://bdu.fstec.ru/vul/2017-02182",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02342",
"RefURL": "https://bdu.fstec.ru/vul/2017-02342",
"Source": "BDU"
},
{
"RefID": "CVE-2017-0898",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0898",
"Source": "CVE"
},
{
"RefID": "CVE-2017-10784",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"Source": "CVE"
},
{
"RefID": "CVE-2017-11465",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11465",
"Source": "CVE"
},
{
"RefID": "CVE-2017-14033",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14033",
"Source": "CVE"
},
{
"RefID": "CVE-2017-14064",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"Source": "CVE"
}
],
"Description": "This update upgrades ruby to version 2.4.2-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01780: Уязвимость функции parser_yyerror анализатора UTF-8-формата интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-02182: Уязвимость интерпретатора Ruby, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-02342: Уязвимость функции аутентификации библиотеки WEBrick, позволяющая нарушителю выполнить произвольные команды\n\n * CVE-2017-0898: Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.\n\n * CVE-2017-10784: The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.\n\n * CVE-2017-11465: The parser_yyerror function in the UTF-8 parser in Ruby 2.4.1 allows attackers to cause a denial of service (invalid write or read) or possibly have unspecified other impact via a crafted Ruby script, related to the parser_tokadd_utf8 function in parse.y. NOTE: this might have security relevance as a bypass of a $SAFE protection mechanism.\n\n * CVE-2017-14033: The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.\n\n * CVE-2017-14064: Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-09-16"
},
"Updated": {
"Date": "2017-09-16"
},
"BDUs": [
{
"ID": "BDU:2017-01780",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-01780",
"Impact": "High",
"Public": "20170720"
},
{
"ID": "BDU:2017-02182",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-02182",
"Impact": "High",
"Public": "20170831"
},
{
"ID": "BDU:2017-02342",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-117",
"Href": "https://bdu.fstec.ru/vul/2017-02342",
"Impact": "High",
"Public": "20170701"
}
],
"CVEs": [
{
"ID": "CVE-2017-0898",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-134",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0898",
"Impact": "Critical",
"Public": "20170915"
},
{
"ID": "CVE-2017-10784",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"Impact": "High",
"Public": "20170919"
},
{
"ID": "CVE-2017-11465",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11465",
"Impact": "Critical",
"Public": "20170719"
},
{
"ID": "CVE-2017-14033",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14033",
"Impact": "High",
"Public": "20170919"
},
{
"ID": "CVE-2017-14064",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"Impact": "Critical",
"Public": "20170831"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20172216001",
"Comment": "irb is earlier than 0:2.4.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172216002",
"Comment": "libruby is earlier than 0:2.4.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172216003",
"Comment": "libruby-devel is earlier than 0:2.4.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172216004",
"Comment": "libruby-devel-static is earlier than 0:2.4.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172216005",
"Comment": "ri is earlier than 0:2.4.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172216006",
"Comment": "ruby is earlier than 0:2.4.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172216007",
"Comment": "ruby-doc-ri is earlier than 0:2.4.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172216008",
"Comment": "ruby-stdlibs is earlier than 0:2.4.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172216009",
"Comment": "ruby-tools is earlier than 0:2.4.2-alt1"
}
]
}
]
}
}
]
}