vuln-list-alt/oval/c9f2/ALT-PU-2015-2097/definitions.json
2024-12-12 21:07:30 +00:00

130 lines
4.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20152097",
"Version": "oval:org.altlinux.errata:def:20152097",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-2097: package `cpio` update to version 2.12-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-2097",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-2097",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-00608",
"RefURL": "https://bdu.fstec.ru/vul/2016-00608",
"Source": "BDU"
},
{
"RefID": "CVE-2014-9112",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9112",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1197",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1197",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2037",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2037",
"Source": "CVE"
}
],
"Description": "This update upgrades cpio to version 2.12-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00608: Уязвимость утилиты архивирования Сpio, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2014-9112: Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.\n\n * CVE-2015-1197: cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.\n\n * CVE-2016-2037: The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-12-14"
},
"Updated": {
"Date": "2015-12-14"
},
"BDUs": [
{
"ID": "BDU:2016-00608",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00608",
"Impact": "Low",
"Public": "20160222"
}
],
"CVEs": [
{
"ID": "CVE-2014-9112",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9112",
"Impact": "Low",
"Public": "20141202"
},
{
"ID": "CVE-2015-1197",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1197",
"Impact": "Low",
"Public": "20150219"
},
{
"ID": "CVE-2016-2037",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2037",
"Impact": "Low",
"Public": "20160222"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20152097001",
"Comment": "cpio is earlier than 0:2.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20152097002",
"Comment": "cpio-static is earlier than 0:2.12-alt1"
}
]
}
]
}
}
]
}