vuln-list-alt/oval/c10f1/ALT-PU-2023-7806/definitions.json
2024-08-15 15:05:08 +00:00

140 lines
5.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20237806",
"Version": "oval:org.altlinux.errata:def:20237806",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-7806: package `nginx` update to version 1.24.0-alt5",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-7806",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-7806",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-06559",
"RefURL": "https://bdu.fstec.ru/vul/2023-06559",
"Source": "BDU"
},
{
"RefID": "CVE-2023-44487",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"Source": "CVE"
}
],
"Description": "This update upgrades nginx to version 1.24.0-alt5. \nSecurity Fix(es):\n\n * BDU:2023-06559: Уязвимость реализации протокола HTTP/2, связанная с возможностью формирования потока запросов в рамках уже установленного сетевого соединения, без открытия новых сетевых соединений и без подтверждения получения пакетов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.\n\n * #38603: /etc/nginx/mime.types does not correctly specify application/wasm\n\n * #47364: Добавить nginx_accept_language_module",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-12-09"
},
"Updated": {
"Date": "2023-12-09"
},
"BDUs": [
{
"ID": "BDU:2023-06559",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2023-06559",
"Impact": "High",
"Public": "20231010"
}
],
"CVEs": [
{
"ID": "CVE-2023-44487",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"Impact": "High",
"Public": "20231010"
}
],
"Bugzilla": [
{
"ID": "38603",
"Href": "https://bugzilla.altlinux.org/38603",
"Data": "/etc/nginx/mime.types does not correctly specify application/wasm"
},
{
"ID": "47364",
"Href": "https://bugzilla.altlinux.org/47364",
"Data": "Добавить nginx_accept_language_module"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20237806001",
"Comment": "nginx is earlier than 0:1.24.0-alt5"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237806002",
"Comment": "nginx-accept_language is earlier than 0:1.24.0-alt5"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237806003",
"Comment": "nginx-geoip is earlier than 0:1.24.0-alt5"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237806004",
"Comment": "nginx-image_filter is earlier than 0:1.24.0-alt5"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237806005",
"Comment": "nginx-pam is earlier than 0:1.24.0-alt5"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237806006",
"Comment": "nginx-perl is earlier than 0:1.24.0-alt5"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237806007",
"Comment": "nginx-spnego is earlier than 0:1.24.0-alt5"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20237806008",
"Comment": "nginx-xslt is earlier than 0:1.24.0-alt5"
}
]
}
]
}
}
]
}