523 lines
26 KiB
JSON
523 lines
26 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20221199",
|
|
"Version": "oval:org.altlinux.errata:def:20221199",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2022-1199: package `mediawiki` update to version 1.37.1-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2022-1199",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1199",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2022-06191",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2022-06191",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2022-06215",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2022-06215",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2022-06216",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2022-06216",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-41798",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41798",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-41799",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41799",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-41800",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41800",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-41801",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41801",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42040",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42040",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42041",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42041",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42042",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42042",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42043",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42043",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42044",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42044",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42045",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42045",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42046",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42046",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42047",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42047",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42048",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42048",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-42049",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42049",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-44854",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44854",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-44855",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44855",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-44856",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44856",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-44857",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44857",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-44858",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-44858",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-45038",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45038",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-45471",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45471",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-45472",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45472",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-45474",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-45474",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-46146",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-46146",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-46147",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-46147",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-46148",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-46148",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-46149",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-46149",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-46150",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-46150",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades mediawiki to version 1.37.1-alt1. \nSecurity Fix(es):\n\n * BDU:2022-06191: Уязвимость функции Special:ChangeContentModel программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации\n\n * BDU:2022-06215: Уязвимость компонента VisualEditor программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)\n\n * BDU:2022-06216: Уязвимость интерфейса REST API программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * CVE-2021-41798: MediaWiki before 1.36.2 allows XSS. Month related MediaWiki messages are not escaped before being used on the Special:Search results page.\n\n * CVE-2021-41799: MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). ApiQueryBacklinks (action=query\u0026list=backlinks) can cause a full table scan.\n\n * CVE-2021-41800: MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). Visiting Special:Contributions can sometimes result in a long running SQL query because PoolCounter protection is mishandled.\n\n * CVE-2021-41801: The ReplaceText extension through 1.41 for MediaWiki has Incorrect Access Control. When a user is blocked after submitting a replace job, the job is still run, even if it may be run at a later time (due to the job queue backlog)\n\n * CVE-2021-42040: An issue was discovered in MediaWiki through 1.36.2. A parser function related to loop control allowed for an infinite loop (and php-fpm hang) within the Loops extension because egLoopsCountLimit is mishandled. This could lead to memory exhaustion.\n\n * CVE-2021-42041: An issue was discovered in CentralAuth in MediaWiki through 1.36.2. The rightsnone MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the setchange log.\n\n * CVE-2021-42042: An issue was discovered in SpecialEditGrowthConfig in the GrowthExperiments extension in MediaWiki through 1.36.2. The growthexperiments-edit-config-error-invalid-title MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript.\n\n * CVE-2021-42043: An issue was discovered in Special:MediaSearch in the MediaSearch extension in MediaWiki through 1.36.2. The suggestion text (a parameter to mediasearch-did-you-mean) was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the intitle: search operator within the query.\n\n * CVE-2021-42044: An issue was discovered in the Mentor dashboard in the GrowthExperiments extension in MediaWiki through 1.36.2. The Growthexperiments-mentor-dashboard-mentee-overview-add-filter-total-edits-headline, growthexperiments-mentor-dashboard-mentee-overview-add-filter-starred-headline, growthexperiments-mentor-dashboard-mentee-overview-info-text, growthexperiments-mentor-dashboard-mentee-overview-info-legend-headline, and growthexperiments-mentor-dashboard-mentee-overview-active-ago MediaWiki messages were not being properly sanitized and allowed for the injection and execution of HTML and JavaScript.\n\n * CVE-2021-42045: An issue was discovered in SecurePoll in the Growth extension in MediaWiki through 1.36.2. Simple polls allow users to create alerts by changing their User-Agent HTTP header and submitting a vote.\n\n * CVE-2021-42046: An issue was discovered in the GlobalWatchlist extension in MediaWiki through 1.36.2. The rev-deleted-user and ntimes messages were not properly escaped and allowed for users to inject HTML and JavaScript.\n\n * CVE-2021-42047: An issue was discovered in the Growth extension in MediaWiki through 1.36.2. On any Wiki with the Mentor Dashboard feature enabled, users can login with a mentor account and trigger an XSS payload (such as alert) via Growthexperiments-mentor-dashboard-mentee-overview-no-js-fallback.\n\n * CVE-2021-42048: An issue was discovered in the Growth extension in MediaWiki through 1.36.2. Any admin can add arbitrary JavaScript code to the Newcomer home page footer, which can be executed by viewers with zero edits.\n\n * CVE-2021-42049: An issue was discovered in the Translate extension in MediaWiki through 1.36.2. Oversighters cannot undo revisions or oversight on pages where they suppressed information (such as PII). This allows oversighters to whitewash revisions.\n\n * CVE-2021-44854: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The REST API publicly caches results from private wikis.\n\n * CVE-2021-44855: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. There is Blind Stored XSS via a URL to the Upload Image feature.\n\n * CVE-2021-44856: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A title blocked by AbuseFilter can be created via Special:ChangeContentModel due to the mishandling of the EditFilterMergedContent hook return value.\n\n * CVE-2021-44857: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=mcrundo followed by action=mcrrestore to replace the content of any arbitrary page (that the user doesn't have edit rights for). This applies to any public wiki, or a private wiki that has at least one page set in $wgWhitelistRead.\n\n * CVE-2021-44858: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=edit\u0026undo= followed by action=mcrundo and action=mcrrestore to view private pages on a private wiki that has at least one page set in $wgWhitelistRead.\n\n * CVE-2021-45038: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. By using an action=rollback query, attackers can view private wiki contents.\n\n * CVE-2021-45471: In MediaWiki through 1.37, blocked IP addresses are allowed to edit EntitySchema items.\n\n * CVE-2021-45472: In MediaWiki through 1.37, XSS can occur in Wikibase because an external identifier property can have a URL format that includes a $1 formatter substitution marker, and the javascript: URL scheme (among others) can be used.\n\n * CVE-2021-45474: In MediaWiki through 1.37, the Special:ImportFile URI (aka FileImporter) allows XSS, as demonstrated by the clientUrl parameter.\n\n * CVE-2021-46146: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The WikibaseMediaInfo component is vulnerable to XSS via the caption fields for a given media file.\n\n * CVE-2021-46147: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. MassEditRegex allows CSRF.\n\n * CVE-2021-46148: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. Some unprivileged users can view confidential information (e.g., IP addresses and User-Agent headers for election traffic) on a testwiki SecurePoll instance.\n\n * CVE-2021-46149: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A denial of service (resource consumption) can be accomplished by searching for a very long key in a Language Name Search.\n\n * CVE-2021-46150: An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. Special:CheckUserLog allows CheckUser XSS because of date mishandling, as demonstrated by an XSS payload in MediaWiki:October.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2022-02-03"
|
|
},
|
|
"Updated": {
|
|
"Date": "2022-02-03"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2022-06191",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2022-06191",
|
|
"Impact": "Critical",
|
|
"Public": "20221004"
|
|
},
|
|
{
|
|
"ID": "BDU:2022-06215",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://bdu.fstec.ru/vul/2022-06215",
|
|
"Impact": "Critical",
|
|
"Public": "20221004"
|
|
},
|
|
{
|
|
"ID": "BDU:2022-06216",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2022-06216",
|
|
"Impact": "High",
|
|
"Public": "20221004"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2021-41798",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41798",
|
|
"Impact": "Low",
|
|
"Public": "20211011"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-41799",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-770",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41799",
|
|
"Impact": "High",
|
|
"Public": "20211011"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-41800",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"CWE": "CWE-770",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41800",
|
|
"Impact": "Low",
|
|
"Public": "20211011"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-41801",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41801",
|
|
"Impact": "High",
|
|
"Public": "20211011"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42040",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-835",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42040",
|
|
"Impact": "High",
|
|
"Public": "20211006"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42041",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42041",
|
|
"Impact": "Low",
|
|
"Public": "20211006"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42042",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42042",
|
|
"Impact": "Low",
|
|
"Public": "20211006"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42043",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42043",
|
|
"Impact": "Low",
|
|
"Public": "20211006"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42044",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42044",
|
|
"Impact": "Low",
|
|
"Public": "20211006"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42045",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42045",
|
|
"Impact": "Low",
|
|
"Public": "20220929"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42046",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42046",
|
|
"Impact": "Low",
|
|
"Public": "20220929"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42047",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42047",
|
|
"Impact": "Low",
|
|
"Public": "20220929"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42048",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42048",
|
|
"Impact": "Low",
|
|
"Public": "20220929"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-42049",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42049",
|
|
"Impact": "Low",
|
|
"Public": "20220929"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-44854",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44854",
|
|
"Impact": "Low",
|
|
"Public": "20221226"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-44855",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44855",
|
|
"Impact": "Low",
|
|
"Public": "20221226"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-44856",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-754",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44856",
|
|
"Impact": "Low",
|
|
"Public": "20221226"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-44857",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-862",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44857",
|
|
"Impact": "Low",
|
|
"Public": "20211217"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-44858",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-276",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-44858",
|
|
"Impact": "High",
|
|
"Public": "20211220"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-45038",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45038",
|
|
"Impact": "Low",
|
|
"Public": "20211217"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-45471",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45471",
|
|
"Impact": "Low",
|
|
"Public": "20211224"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-45472",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45472",
|
|
"Impact": "Low",
|
|
"Public": "20211224"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-45474",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-45474",
|
|
"Impact": "Low",
|
|
"Public": "20211224"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-46146",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-46146",
|
|
"Impact": "Low",
|
|
"Public": "20220110"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-46147",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-46147",
|
|
"Impact": "High",
|
|
"Public": "20220110"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-46148",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-46148",
|
|
"Impact": "Low",
|
|
"Public": "20220110"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-46149",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-400",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-46149",
|
|
"Impact": "High",
|
|
"Public": "20220110"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-46150",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-46150",
|
|
"Impact": "Low",
|
|
"Public": "20220110"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20221199001",
|
|
"Comment": "mediawiki is earlier than 0:1.37.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20221199002",
|
|
"Comment": "mediawiki-apache2 is earlier than 0:1.37.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20221199003",
|
|
"Comment": "mediawiki-common is earlier than 0:1.37.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20221199004",
|
|
"Comment": "mediawiki-extensions-PdfHandler is earlier than 0:1.37.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20221199005",
|
|
"Comment": "mediawiki-extensions-SyntaxHighlight_GeSHi is earlier than 1:1.37.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20221199006",
|
|
"Comment": "mediawiki-mysql is earlier than 0:1.37.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20221199007",
|
|
"Comment": "mediawiki-postgresql is earlier than 0:1.37.1-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |