vuln-list-alt/oval/c10f1/ALT-PU-2024-6382/definitions.json
2024-04-17 09:02:51 +00:00

233 lines
12 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20246382",
"Version": "oval:org.altlinux.errata:def:20246382",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-6382: package `python3` update to version 3.9.18-alt0.c10f1.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-6382",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-6382",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-05975",
"RefURL": "https://bdu.fstec.ru/vul/2022-05975",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00665",
"RefURL": "https://bdu.fstec.ru/vul/2023-00665",
"Source": "BDU"
},
{
"RefID": "BDU:2023-04978",
"RefURL": "https://bdu.fstec.ru/vul/2023-04978",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05002",
"RefURL": "https://bdu.fstec.ru/vul/2023-05002",
"Source": "BDU"
},
{
"RefID": "CVE-2007-4559",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2007-4559",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4303",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4303",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0286",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0286",
"Source": "CVE"
},
{
"RefID": "CVE-2023-24329",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-24329",
"Source": "CVE"
},
{
"RefID": "CVE-2023-40217",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-40217",
"Source": "CVE"
}
],
"Description": "This update upgrades python3 to version 3.9.18-alt0.c10f1.1. \nSecurity Fix(es):\n\n * BDU:2022-05975: Уязвимость функций extract и extractall модуля tarfile интерпретатора языка программирования Python, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-00665: Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-04978: Уязвимость компонента urllib.parse интерпретатора языка программирования Python, позволяющая нарушителю обходить блокировки URL-адресов\n\n * BDU:2023-05002: Уязвимость класса SSLSocket интерпретатора языка программирования Python, позволяющая нарушителю раскрыть защищаемую информацию\n\n * CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.\n\n * CVE-2022-4303: The WP Limit Login Attempts WordPress plugin through 2.6.4 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based restrictions on login forms.\n\n * CVE-2023-0286: There is a type confusion vulnerability relating to X.400 address processing\ninside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but\nthe public structure definition for GENERAL_NAME incorrectly specified the type\nof the x400Address field as ASN1_TYPE. This field is subsequently interpreted by\nthe OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an\nASN1_STRING.\n\nWhen CRL checking is enabled (i.e. the application sets the\nX509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass\narbitrary pointers to a memcmp call, enabling them to read memory contents or\nenact a denial of service. In most cases, the attack requires the attacker to\nprovide both the certificate chain and CRL, neither of which need to have a\nvalid signature. If the attacker only controls one of these inputs, the other\ninput must already contain an X.400 address as a CRL distribution point, which\nis uncommon. As such, this vulnerability is most likely to only affect\napplications which have implemented their own functionality for retrieving CRLs\nover a network.\n\n\n\n * CVE-2023-24329: An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.\n\n * CVE-2023-40217: An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as \"not connected\" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)\n\n * #49415: Обновление python3 для закрытия уязвимостей",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-04-17"
},
"Updated": {
"Date": "2024-04-17"
},
"BDUs": [
{
"ID": "BDU:2022-05975",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2022-05975",
"Impact": "High",
"Public": "20070827"
},
{
"ID": "BDU:2023-00665",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2023-00665",
"Impact": "High",
"Public": "20230207"
},
{
"ID": "BDU:2023-04978",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2023-04978",
"Impact": "High",
"Public": "20230217"
},
{
"ID": "BDU:2023-05002",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-665",
"Href": "https://bdu.fstec.ru/vul/2023-05002",
"Impact": "High",
"Public": "20230824"
}
],
"CVEs": [
{
"ID": "CVE-2007-4559",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2007-4559",
"Impact": "Low",
"Public": "20070828"
},
{
"ID": "CVE-2022-4303",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4303",
"Impact": "High",
"Public": "20230123"
},
{
"ID": "CVE-2023-0286",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0286",
"Impact": "High",
"Public": "20230208"
},
{
"ID": "CVE-2023-24329",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-24329",
"Impact": "High",
"Public": "20230217"
},
{
"ID": "CVE-2023-40217",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-40217",
"Impact": "Low",
"Public": "20230825"
}
],
"Bugzilla": [
{
"ID": "49415",
"Href": "https://bugzilla.altlinux.org/49415",
"Data": "Обновление python3 для закрытия уязвимостей"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20246382001",
"Comment": "libpython3 is earlier than 0:3.9.18-alt0.c10f1.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246382002",
"Comment": "python3 is earlier than 0:3.9.18-alt0.c10f1.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246382003",
"Comment": "python3-base is earlier than 0:3.9.18-alt0.c10f1.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246382004",
"Comment": "python3-dev is earlier than 0:3.9.18-alt0.c10f1.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246382005",
"Comment": "python3-modules-curses is earlier than 0:3.9.18-alt0.c10f1.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246382006",
"Comment": "python3-modules-sqlite3 is earlier than 0:3.9.18-alt0.c10f1.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246382007",
"Comment": "python3-modules-tkinter is earlier than 0:3.9.18-alt0.c10f1.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246382008",
"Comment": "python3-test is earlier than 0:3.9.18-alt0.c10f1.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246382009",
"Comment": "python3-tools is earlier than 0:3.9.18-alt0.c10f1.1"
}
]
}
]
}
}
]
}