514 lines
24 KiB
JSON
514 lines
24 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20247465",
|
||
"Version": "oval:org.altlinux.errata:def:20247465",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2024-7465: package `xpdf` update to version 4.05-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p11"
|
||
],
|
||
"Products": [
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2024-7465",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-7465",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05310",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05310",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01225",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01225",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01226",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01226",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-01305",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-01305",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2024-02274",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2024-02274",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16369",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16369",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-7453",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7453",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-16088",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-16088",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9587",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9587",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-9588",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9588",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-30524",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-30524",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-30775",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-30775",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-33108",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-33108",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-36561",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-36561",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38171",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38171",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38222",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38222",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38334",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38334",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-38928",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-38928",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41842",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41842",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41843",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41843",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-41844",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-41844",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-43071",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-43071",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-43295",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-43295",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45586",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45586",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-45587",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45587",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2662",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2662",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2663",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2663",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-2664",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2664",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-26930",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-26930",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3044",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3044",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-3436",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3436",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades xpdf to version 4.05-alt1. \nSecurity Fix(es):\n\n * BDU:2022-05310: Уязвимость функции JBIG2Stream::readTextRegionSeg() (JBIG2Stream.cc) программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2024-01225: Уязвимость функции XRef::fetch (XRef.cc) программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-01226: Уязвимость функции AcroForm::scanField программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-01305: Уязвимость функции XRef::fetch() программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать аварийное завершение работы приложения\n\n * BDU:2024-02274: Уязвимость компонент /xpdf/AcroForm.cc:538 программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-16369: XRef::fetch in XRef.cc in Xpdf 4.00 allows remote attackers to cause a denial of service (stack consumption) via a crafted pdf file, related to AcroForm::scanField, as demonstrated by pdftohtml. NOTE: this might overlap CVE-2018-7453.\n\n * CVE-2018-7453: Infinite recursion in AcroForm::scanField in AcroForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file due to lack of loop checking, as demonstrated by pdftohtml.\n\n * CVE-2019-16088: Xpdf 3.04 has a SIGSEGV in XRef::fetch in XRef.cc after many recursive calls to Catalog::countPageTree in Catalog.cc.\n\n * CVE-2019-9587: There is a stack consumption issue in md5Round1() located in Decrypt.cc in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to Catalog::countPageTree.\n\n * CVE-2019-9588: There is an Invalid memory access in gAtomicIncrement() located at GMutex.h in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdftops binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.\n\n * CVE-2022-30524: There is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.\n\n * CVE-2022-30775: xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered by (for example) sending a crafted PDF document to the pdftoppm binary. It is most easily reproduced with the DCMAKE_CXX_COMPILER=afl-clang-fast++ option.\n\n * CVE-2022-33108: XPDF v4.04 was discovered to contain a stack overflow vulnerability via the Object::Copy class of object.cc files.\n\n * CVE-2022-36561: XPDF v4.0.4 was discovered to contain a segmentation violation via the component /xpdf/AcroForm.cc:538.\n\n * CVE-2022-38171: Xpdf prior to version 4.04 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2021-30860 (Apple CoreGraphics).\n\n * CVE-2022-38222: There is a use-after-free issue in JBIG2Stream::close() located in JBIG2Stream.cc in Xpdf 4.04. It can be triggered by sending a crafted PDF file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact.\n\n * CVE-2022-38334: XPDF v4.04 and earlier was discovered to contain a stack overflow via the function Catalog::countPageTree() at Catalog.cc.\n\n * CVE-2022-38928: XPDF 4.04 is vulnerable to Null Pointer Dereference in FoFiType1C.cc:2393.\n\n * CVE-2022-41842: An issue was discovered in Xpdf 4.04. There is a crash in gfseek(_IO_FILE*, long, int) in goo/gfile.cc.\n\n * CVE-2022-41843: An issue was discovered in Xpdf 4.04. There is a crash in convertToType0 in fofi/FoFiType1C.cc, a different vulnerability than CVE-2022-38928.\n\n * CVE-2022-41844: An issue was discovered in Xpdf 4.04. There is a crash in XRef::fetch(int, int, Object*, int) in xpdf/XRef.cc, a different vulnerability than CVE-2018-16369 and CVE-2019-16088.\n\n * CVE-2022-43071: A stack overflow in the Catalog::readPageLabelTree2(Object*) function of XPDF v4.04 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.\n\n * CVE-2022-43295: XPDF v4.04 was discovered to contain a stack overflow via the function FileStream::copy() at xpdf/Stream.cc:795.\n\n * CVE-2022-45586: Stack overflow vulnerability in function Dict::find in xpdf/Dict.cc in xpdf 4.04, allows local attackers to cause a denial of service.\n\n * CVE-2022-45587: Stack overflow vulnerability in function gmalloc in goo/gmem.cc in xpdf 4.04, allows local attackers to cause a denial of service.\n\n * CVE-2023-2662: In Xpdf 4.04 (and earlier), a bad color space object in the input PDF file can cause a divide-by-zero.\n\n\n\n\n * CVE-2023-2663: In Xpdf 4.04 (and earlier), a PDF object loop in the page label tree leads to infinite recursion and a stack overflow.\n\n\n\n\n * CVE-2023-2664: In Xpdf 4.04 (and earlier), a PDF object loop in the embedded file tree leads to infinite recursion and a stack overflow.\n\n\n\n\n * CVE-2023-26930: Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via the PDFDoc malloc in the pdftotext.cc function. NOTE: Vendor states “it's an expected abort on out-of-memory error.”\n\n * CVE-2023-3044: An excessively large PDF page size (found in fuzz testing, unlikely in normal PDF files) can result in a divide-by-zero in Xpdf's text extraction code.\n\n\n\n\nThis is related to CVE-2022-30524, but the problem here is caused by a very large page size, rather than by a very large character coordinate.\n\n\n\n\n * CVE-2023-3436: Xpdf 4.04 will deadlock on a PDF object stream whose \"Length\" field is itself in another object stream.\n\n\n\n * #48335: исправить путь к шрифтам в xpdfrc",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2024-05-04"
|
||
},
|
||
"Updated": {
|
||
"Date": "2024-05-04"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-05310",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05310",
|
||
"Impact": "Critical",
|
||
"Public": "20220822"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01225",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-17, CWE-404",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01225",
|
||
"Impact": "Low",
|
||
"Public": "20180902"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01226",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01226",
|
||
"Impact": "Low",
|
||
"Public": "20180224"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-01305",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-01305",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "BDU:2024-02274",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2024-02274",
|
||
"Impact": "Low",
|
||
"Public": "20220716"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-16369",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16369",
|
||
"Impact": "Low",
|
||
"Public": "20180903"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-7453",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7453",
|
||
"Impact": "Low",
|
||
"Public": "20180224"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-16088",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-674",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-16088",
|
||
"Impact": "Low",
|
||
"Public": "20190906"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9587",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9587",
|
||
"Impact": "High",
|
||
"Public": "20190306"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-9588",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9588",
|
||
"Impact": "High",
|
||
"Public": "20190306"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-30524",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-30524",
|
||
"Impact": "High",
|
||
"Public": "20220509"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-30775",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-30775",
|
||
"Impact": "Low",
|
||
"Public": "20220516"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-33108",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-33108",
|
||
"Impact": "High",
|
||
"Public": "20220628"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-36561",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-36561",
|
||
"Impact": "Low",
|
||
"Public": "20220830"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38171",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38171",
|
||
"Impact": "High",
|
||
"Public": "20220822"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38222",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38222",
|
||
"Impact": "High",
|
||
"Public": "20220929"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38334",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-674",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38334",
|
||
"Impact": "Low",
|
||
"Public": "20220915"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-38928",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-38928",
|
||
"Impact": "High",
|
||
"Public": "20220921"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41842",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41842",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41843",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41843",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-41844",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-41844",
|
||
"Impact": "Low",
|
||
"Public": "20220930"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-43071",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-43071",
|
||
"Impact": "Low",
|
||
"Public": "20221115"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-43295",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-43295",
|
||
"Impact": "Low",
|
||
"Public": "20221114"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45586",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45586",
|
||
"Impact": "Low",
|
||
"Public": "20230215"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-45587",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45587",
|
||
"Impact": "Low",
|
||
"Public": "20230215"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2662",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2662",
|
||
"Impact": "Low",
|
||
"Public": "20230511"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2663",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-674",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2663",
|
||
"Impact": "Low",
|
||
"Public": "20230511"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-2664",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-674",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2664",
|
||
"Impact": "Low",
|
||
"Public": "20230511"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-26930",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-26930",
|
||
"Impact": "Low",
|
||
"Public": "20230426"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3044",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3044",
|
||
"Impact": "Low",
|
||
"Public": "20230602"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-3436",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3436",
|
||
"Impact": "Low",
|
||
"Public": "20230627"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "48335",
|
||
"Href": "https://bugzilla.altlinux.org/48335",
|
||
"Data": "исправить путь к шрифтам в xpdfrc"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:container:11"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20247465001",
|
||
"Comment": "xpdf is earlier than 0:4.05-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20247465002",
|
||
"Comment": "xpdf-common is earlier than 0:4.05-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20247465003",
|
||
"Comment": "xpdf-desktop is earlier than 0:4.05-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20247465004",
|
||
"Comment": "xpdf-i18n is earlier than 0:4.05-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20247465005",
|
||
"Comment": "xpdf-utils is earlier than 0:4.05-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20247465006",
|
||
"Comment": "xpdf-viewer is earlier than 0:4.05-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |