vuln-list-alt/oval/c9f2/ALT-PU-2020-3333/definitions.json
2024-12-12 21:07:30 +00:00

308 lines
16 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20203333",
"Version": "oval:org.altlinux.errata:def:20203333",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-3333: package `mariadb` update to version 10.4.17-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-3333",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3333",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-05020",
"RefURL": "https://bdu.fstec.ru/vul/2020-05020",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05076",
"RefURL": "https://bdu.fstec.ru/vul/2020-05076",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05078",
"RefURL": "https://bdu.fstec.ru/vul/2020-05078",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05084",
"RefURL": "https://bdu.fstec.ru/vul/2020-05084",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02469",
"RefURL": "https://bdu.fstec.ru/vul/2021-02469",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03502",
"RefURL": "https://bdu.fstec.ru/vul/2021-03502",
"Source": "BDU"
},
{
"RefID": "CVE-2020-14765",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14765",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14776",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14776",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14789",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14789",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14812",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14812",
"Source": "CVE"
},
{
"RefID": "CVE-2020-15180",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15180",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2194",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2194",
"Source": "CVE"
}
],
"Description": "This update upgrades mariadb to version 10.4.17-alt1. \nSecurity Fix(es):\n\n * BDU:2020-05020: Уязвимость системы управления базами данных MariaDB, компонента Server: FTS СУБД MySQL, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05076: Уязвимость компонента Server: Locking системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05078: Уязвимость компонента Server: FTS системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05084: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-02469: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03502: Уязвимость компонента mysql-wsrep СУБД MariaDB, связанная с ошибками обработки входных данных при выполнении синтаксического анализа кода, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2020-14765: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14776: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14789: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14812: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-15180: A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.\n\n * CVE-2021-2194: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-11-17"
},
"Updated": {
"Date": "2020-11-17"
},
"BDUs": [
{
"ID": "BDU:2020-05020",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05020",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05076",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05076",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05078",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05078",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05084",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05084",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2021-02469",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-02469",
"Impact": "Low",
"Public": "20210420"
},
{
"ID": "BDU:2021-03502",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-96",
"Href": "https://bdu.fstec.ru/vul/2021-03502",
"Impact": "Critical",
"Public": "20201003"
}
],
"CVEs": [
{
"ID": "CVE-2020-14765",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14765",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14776",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14776",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14789",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14789",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14812",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14812",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-15180",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-77",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15180",
"Impact": "Critical",
"Public": "20210527"
},
{
"ID": "CVE-2021-2194",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2194",
"Impact": "Low",
"Public": "20210422"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20203333001",
"Comment": "libmariadb-devel is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333002",
"Comment": "libmariadb3 is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333003",
"Comment": "libmariadbd-devel is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333004",
"Comment": "libmariadbd19 is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333005",
"Comment": "mariadb is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333006",
"Comment": "mariadb-backup is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333007",
"Comment": "mariadb-bench is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333008",
"Comment": "mariadb-client is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333009",
"Comment": "mariadb-common is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333010",
"Comment": "mariadb-connect-engine is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333011",
"Comment": "mariadb-cracklib-password-check is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333012",
"Comment": "mariadb-gssapi-server is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333013",
"Comment": "mariadb-oqgraph-engine is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333014",
"Comment": "mariadb-rocksdb-engine is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333015",
"Comment": "mariadb-server is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333016",
"Comment": "mariadb-server-control is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333017",
"Comment": "mariadb-server-galera is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333018",
"Comment": "mariadb-server-perl is earlier than 0:10.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20203333019",
"Comment": "mariadb-sphinx-engine is earlier than 0:10.4.17-alt1"
}
]
}
]
}
}
]
}