2024-10-10 03:05:27 +00:00

109 lines
3.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:202413578",
"Version": "oval:org.altlinux.errata:def:202413578",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-13578: package `python-module-urllib3` update to version 1.25.10-alt3.c10f1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-13578",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-13578",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00586",
"RefURL": "https://bdu.fstec.ru/vul/2022-00586",
"Source": "BDU"
},
{
"RefID": "CVE-2021-33503",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33503",
"Source": "CVE"
}
],
"Description": "This update upgrades python-module-urllib3 to version 1.25.10-alt3.c10f1. \nSecurity Fix(es):\n\n * BDU:2022-00586: Уязвимость HTTP-клиента для Python urllib3, связанная с неконтролируемым потреблением ресурсов, позволяющая нарушителю выполнить отказ в обслуживании\n\n * CVE-2021-33503: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-10-09"
},
"Updated": {
"Date": "2024-10-09"
},
"BDUs": [
{
"ID": "BDU:2022-00586",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2022-00586",
"Impact": "High",
"Public": "20210613"
}
],
"CVEs": [
{
"ID": "CVE-2021-33503",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33503",
"Impact": "High",
"Public": "20210629"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:202413578001",
"Comment": "python-module-urllib3 is earlier than 2:1.25.10-alt3.c10f1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202413578002",
"Comment": "python-module-urllib3-docs is earlier than 2:1.25.10-alt3.c10f1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:202413578003",
"Comment": "python-module-urllib3-pickles is earlier than 2:1.25.10-alt3.c10f1"
}
]
}
]
}
}
]
}