vuln-list-alt/oval/p11/ALT-PU-2021-1479/definitions.json
2024-12-12 21:07:30 +00:00

122 lines
4.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211479",
"Version": "oval:org.altlinux.errata:def:20211479",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1479: package `openvswitch` update to version 2.14.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1479",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1479",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-01134",
"RefURL": "https://bdu.fstec.ru/vul/2021-01134",
"Source": "BDU"
},
{
"RefID": "CVE-2020-35498",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35498",
"Source": "CVE"
}
],
"Description": "This update upgrades openvswitch to version 2.14.2-alt1. \nSecurity Fix(es):\n\n * BDU:2021-01134: Уязвимость микропрограммного обеспечения коммутатора Open vSwitch, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-03-14"
},
"Updated": {
"Date": "2021-03-14"
},
"BDUs": [
{
"ID": "BDU:2021-01134",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2021-01134",
"Impact": "High",
"Public": "20210210"
}
],
"CVEs": [
{
"ID": "CVE-2020-35498",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35498",
"Impact": "High",
"Public": "20210211"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211479001",
"Comment": "libopenvswitch is earlier than 0:2.14.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211479002",
"Comment": "libopenvswitch-devel is earlier than 0:2.14.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211479003",
"Comment": "openvswitch is earlier than 0:2.14.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211479004",
"Comment": "openvswitch-debugtools is earlier than 0:2.14.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211479005",
"Comment": "openvswitch-ipsec is earlier than 0:2.14.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211479006",
"Comment": "openvswitch-vtep is earlier than 0:2.14.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211479007",
"Comment": "python3-module-openvswitch is earlier than 0:2.14.2-alt1"
}
]
}
]
}
}
]
}