vuln-list-alt/oval/c9f2/ALT-PU-2020-3343/definitions.json
2024-06-28 13:17:52 +00:00

181 lines
7.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20203343",
"Version": "oval:org.altlinux.errata:def:20203343",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-3343: package `perl` update to version 5.28.3-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-3343",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3343",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-04039",
"RefURL": "https://bdu.fstec.ru/vul/2020-04039",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04040",
"RefURL": "https://bdu.fstec.ru/vul/2020-04040",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04041",
"RefURL": "https://bdu.fstec.ru/vul/2020-04041",
"Source": "BDU"
},
{
"RefID": "CVE-2020-10543",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10543",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10878",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10878",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12723",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12723",
"Source": "CVE"
}
],
"Description": "This update upgrades perl to version 5.28.3-alt1. \nSecurity Fix(es):\n\n * BDU:2020-04039: Уязвимость интерпретатора языка программирования Perl, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04040: Уязвимость параметра PL_regkind[OP(n)] == NOTHING интерпретатора языка программирования Perl, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-04041: Уязвимость реализации функции S_study_chunk интерпретатора языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-10543: Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.\n\n * CVE-2020-10878: Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.\n\n * CVE-2020-12723: regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-11-18"
},
"Updated": {
"Date": "2020-11-18"
},
"BDUs": [
{
"ID": "BDU:2020-04039",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-04039",
"Impact": "High",
"Public": "20200601"
},
{
"ID": "BDU:2020-04040",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-04040",
"Impact": "High",
"Public": "20200601"
},
{
"ID": "BDU:2020-04041",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2020-04041",
"Impact": "High",
"Public": "20200601"
}
],
"CVEs": [
{
"ID": "CVE-2020-10543",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10543",
"Impact": "High",
"Public": "20200605"
},
{
"ID": "CVE-2020-10878",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10878",
"Impact": "High",
"Public": "20200605"
},
{
"ID": "CVE-2020-12723",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12723",
"Impact": "High",
"Public": "20200605"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20203343001",
"Comment": "perl-DBM is earlier than 1:5.28.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203343002",
"Comment": "perl-Unicode-Normalize is earlier than 1:5.28.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203343003",
"Comment": "perl-base is earlier than 1:5.28.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203343004",
"Comment": "perl-devel is earlier than 1:5.28.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203343005",
"Comment": "perl-pod is earlier than 1:5.28.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203343006",
"Comment": "perl-threads is earlier than 1:5.28.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203343007",
"Comment": "perl-unicore is earlier than 1:5.28.3-alt1"
}
]
}
]
}
}
]
}