vuln-list-alt/oval/c9f2/ALT-PU-2018-2901/definitions.json
2024-06-28 13:17:52 +00:00

238 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182901",
"Version": "oval:org.altlinux.errata:def:20182901",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2901: package `qt5-svg` update to version 5.11.3-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2901",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2901",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-00921",
"RefURL": "https://bdu.fstec.ru/vul/2019-00921",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00922",
"RefURL": "https://bdu.fstec.ru/vul/2019-00922",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00951",
"RefURL": "https://bdu.fstec.ru/vul/2019-00951",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03456",
"RefURL": "https://bdu.fstec.ru/vul/2021-03456",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03457",
"RefURL": "https://bdu.fstec.ru/vul/2021-03457",
"Source": "BDU"
},
{
"RefID": "CVE-2018-15518",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15518",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19865",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19865",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19869",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19869",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19870",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19870",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19871",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19871",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19873",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19873",
"Source": "CVE"
}
],
"Description": "This update upgrades qt5-svg to version 5.11.3-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00921: Уязвимость функции QGifHandler кроссплатформенного фреймворка для разработки программного обеспечения Qt, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00922: Уязвимость функции QXMLStreamReader компонента QXmlStream кроссплатформенного фреймворка для разработки программного обеспечения Qt, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к информации\n\n * BDU:2019-00951: Уязвимость класса QBmpHandler кроссплатформенного фреймворка для разработки программного обеспечения Qt, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к информации\n\n * BDU:2021-03456: Уязвимость компонента qsvghandler.cpp кроссплатформенного фреймворка для разработки программного обеспечения Qt, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03457: Уязвимость компонента QTgaFile кроссплатформенного фреймворка для разработки программного обеспечения Qt, связанная с ошибкой механизма контроля расходуемых ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-15518: QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.\n\n * CVE-2018-19865: A keystroke logging issue was discovered in Virtual Keyboard in Qt 5.7.x, 5.8.x, 5.9.x, 5.10.x, and 5.11.x before 5.11.3.\n\n * CVE-2018-19869: An issue was discovered in Qt before 5.11.3. A malformed SVG image causes a segmentation fault in qsvghandler.cpp.\n\n * CVE-2018-19870: An issue was discovered in Qt before 5.11.3. A malformed GIF image causes a NULL pointer dereference in QGifHandler resulting in a segmentation fault.\n\n * CVE-2018-19871: An issue was discovered in Qt before 5.11.3. There is QTgaFile Uncontrolled Resource Consumption.\n\n * CVE-2018-19873: An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer overflow via BMP data.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-12-19"
},
"Updated": {
"Date": "2018-12-19"
},
"BDUs": [
{
"ID": "BDU:2019-00921",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-00921",
"Impact": "High",
"Public": "20190222"
},
{
"ID": "BDU:2019-00922",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2019-00922",
"Impact": "High",
"Public": "20181226"
},
{
"ID": "BDU:2019-00951",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-00951",
"Impact": "High",
"Public": "20190222"
},
{
"ID": "BDU:2021-03456",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-03456",
"Impact": "Low",
"Public": "20180709"
},
{
"ID": "BDU:2021-03457",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2021-03457",
"Impact": "Low",
"Public": "20180824"
}
],
"CVEs": [
{
"ID": "CVE-2018-15518",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15518",
"Impact": "High",
"Public": "20181226"
},
{
"ID": "CVE-2018-19865",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-532",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19865",
"Impact": "High",
"Public": "20181205"
},
{
"ID": "CVE-2018-19869",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19869",
"Impact": "Low",
"Public": "20181226"
},
{
"ID": "CVE-2018-19870",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19870",
"Impact": "High",
"Public": "20181226"
},
{
"ID": "CVE-2018-19871",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19871",
"Impact": "Low",
"Public": "20181226"
},
{
"ID": "CVE-2018-19873",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19873",
"Impact": "Critical",
"Public": "20181226"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182901001",
"Comment": "libqt5-svg is earlier than 0:5.11.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182901002",
"Comment": "qt5-svg-common is earlier than 0:5.11.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182901003",
"Comment": "qt5-svg-devel is earlier than 0:5.11.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182901004",
"Comment": "qt5-svg-doc is earlier than 0:5.11.3-alt1"
}
]
}
]
}
}
]
}