2024-06-28 13:17:52 +00:00

123 lines
4.6 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20193157",
"Version": "oval:org.altlinux.errata:def:20193157",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-3157: package `zziplib` update to version 0.13.69-alt3",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-3157",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-3157",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-00739",
"RefURL": "https://bdu.fstec.ru/vul/2020-00739",
"Source": "BDU"
},
{
"RefID": "CVE-2018-16548",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16548",
"Source": "CVE"
},
{
"RefID": "CVE-2018-17828",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17828",
"Source": "CVE"
}
],
"Description": "This update upgrades zziplib to version 0.13.69-alt3. \nSecurity Fix(es):\n\n * BDU:2020-00739: Уязвимость функции __zzip_parse_root_directory библиотеки архивирования ZZIPlib, связанная с неосвобождением ресурса после истечения действительного срока его эксплуатирования, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-16548: An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which will lead to a denial of service attack.\n\n * CVE-2018-17828: Directory traversal vulnerability in ZZIPlib 0.13.69 allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-11-20"
},
"Updated": {
"Date": "2019-11-20"
},
"BDUs": [
{
"ID": "BDU:2020-00739",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-00739",
"Impact": "Low",
"Public": "20180805"
}
],
"CVEs": [
{
"ID": "CVE-2018-16548",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16548",
"Impact": "Low",
"Public": "20180905"
},
{
"ID": "CVE-2018-17828",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17828",
"Impact": "Low",
"Public": "20181001"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20193157001",
"Comment": "zziplib is earlier than 0:0.13.69-alt3"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193157002",
"Comment": "zziplib-devel is earlier than 0:0.13.69-alt3"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193157003",
"Comment": "zziplib-utils is earlier than 0:0.13.69-alt3"
}
]
}
]
}
}
]
}