2024-06-28 13:17:52 +00:00

397 lines
20 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20181704",
"Version": "oval:org.altlinux.errata:def:20181704",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-1704: package `php7` update to version 7.2.5-alt1.S1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-1704",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1704",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00525",
"RefURL": "https://bdu.fstec.ru/vul/2018-00525",
"Source": "BDU"
},
{
"RefID": "BDU:2018-01504",
"RefURL": "https://bdu.fstec.ru/vul/2018-01504",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04233",
"RefURL": "https://bdu.fstec.ru/vul/2019-04233",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04234",
"RefURL": "https://bdu.fstec.ru/vul/2019-04234",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04235",
"RefURL": "https://bdu.fstec.ru/vul/2019-04235",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04236",
"RefURL": "https://bdu.fstec.ru/vul/2019-04236",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01418",
"RefURL": "https://bdu.fstec.ru/vul/2020-01418",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01578",
"RefURL": "https://bdu.fstec.ru/vul/2020-01578",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03181",
"RefURL": "https://bdu.fstec.ru/vul/2020-03181",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02428",
"RefURL": "https://bdu.fstec.ru/vul/2022-02428",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02429",
"RefURL": "https://bdu.fstec.ru/vul/2022-02429",
"Source": "BDU"
},
{
"RefID": "CVE-2018-10545",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10545",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10546",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10546",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10547",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10547",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10548",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10548",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10549",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10549",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19395",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19395",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19396",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19396",
"Source": "CVE"
},
{
"RefID": "CVE-2018-7584",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7584",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11034",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11034",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11035",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11035",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9675",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9675",
"Source": "CVE"
}
],
"Description": "This update upgrades php7 to version 7.2.5-alt1.S1. \nSecurity Fix(es):\n\n * BDU:2018-00525: Уязвимость функции php_stream_url_wrap_http_ex интерпретатора PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2018-01504: Уязвимость функции ldap_get_dn интерпретатора PHP, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04233: Уязвимость дочерних FPM-процессов интерпретатора языка программирования PHP, позволяющая нарушителю обойти проверку доступа opcache и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04234: Уязвимость потокового фильтра iconv (ext/iconv/iconv.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04235: Уязвимость компонента ext/phar/phar_object.c интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)\n\n * BDU:2019-04236: Уязвимость функции exif_read_data (ext/exif/exif.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2020-01418: Уязвимость функции exif_process_IFD_TAG интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации или вызвать отказ в обслуживании\n\n * BDU:2020-01578: Уязвимость функции exif_iif_add_value расширения EXIF интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании\n\n * BDU:2020-03181: Уязвимость функции phar_tar_writeheaders_int (ext/phar/tar.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02428: Уязвимость компонента ext/standard/var_unserializer.c интерпретатора языка программирования PHP , позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02429: Уязвимость компонента ext/standard/var.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-10545: An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.\n\n * CVE-2018-10546: An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.\n\n * CVE-2018-10547: An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.\n\n * CVE-2018-10548: An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.\n\n * CVE-2018-10549: An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\\0' character.\n\n * CVE-2018-19395: ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM(\"WScript.Shell\").\n\n * CVE-2018-19396: ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.\n\n * CVE-2018-7584: In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.\n\n * CVE-2019-11034: When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.\n\n * CVE-2019-11035: When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.\n\n * CVE-2019-9675: An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: \"This issue allows theoretical compromise of security, but a practical attack is usually impossible.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-05-15"
},
"Updated": {
"Date": "2018-05-15"
},
"BDUs": [
{
"ID": "BDU:2018-00525",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00525",
"Impact": "Critical",
"Public": "20180301"
},
{
"ID": "BDU:2018-01504",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2018-01504",
"Impact": "High",
"Public": "20180429"
},
{
"ID": "BDU:2019-04233",
"CVSS": "AV:L/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04233",
"Impact": "Low",
"Public": "20180329"
},
{
"ID": "BDU:2019-04234",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2019-04234",
"Impact": "High",
"Public": "20180426"
},
{
"ID": "BDU:2019-04235",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2019-04235",
"Impact": "Low",
"Public": "20180426"
},
{
"ID": "BDU:2019-04236",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04236",
"Impact": "High",
"Public": "20180426"
},
{
"ID": "BDU:2020-01418",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01418",
"Impact": "Critical",
"Public": "20190316"
},
{
"ID": "BDU:2020-01578",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-119, CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01578",
"Impact": "High",
"Public": "20190111"
},
{
"ID": "BDU:2020-03181",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-03181",
"Impact": "High",
"Public": "20190311"
},
{
"ID": "BDU:2022-02428",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-502",
"Href": "https://bdu.fstec.ru/vul/2022-02428",
"Impact": "High",
"Public": "20181120"
},
{
"ID": "BDU:2022-02429",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-02429",
"Impact": "High",
"Public": "20181120"
}
],
"CVEs": [
{
"ID": "CVE-2018-10545",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10545",
"Impact": "Low",
"Public": "20180429"
},
{
"ID": "CVE-2018-10546",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10546",
"Impact": "High",
"Public": "20180429"
},
{
"ID": "CVE-2018-10547",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10547",
"Impact": "Low",
"Public": "20180429"
},
{
"ID": "CVE-2018-10548",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10548",
"Impact": "High",
"Public": "20180429"
},
{
"ID": "CVE-2018-10549",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10549",
"Impact": "High",
"Public": "20180429"
},
{
"ID": "CVE-2018-19395",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19395",
"Impact": "High",
"Public": "20181120"
},
{
"ID": "CVE-2018-19396",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19396",
"Impact": "High",
"Public": "20181120"
},
{
"ID": "CVE-2018-7584",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7584",
"Impact": "Critical",
"Public": "20180301"
},
{
"ID": "CVE-2019-11034",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11034",
"Impact": "Critical",
"Public": "20190418"
},
{
"ID": "CVE-2019-11035",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11035",
"Impact": "Critical",
"Public": "20190418"
},
{
"ID": "CVE-2019-9675",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9675",
"Impact": "High",
"Public": "20190311"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20181704001",
"Comment": "php7 is earlier than 0:7.2.5-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181704002",
"Comment": "php7-devel is earlier than 0:7.2.5-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181704003",
"Comment": "php7-libs is earlier than 0:7.2.5-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181704004",
"Comment": "php7-mysqlnd is earlier than 0:7.2.5-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181704005",
"Comment": "rpm-build-php7-version is earlier than 0:7.2.5-alt1.S1"
}
]
}
]
}
}
]
}