vuln-list-alt/oval/c9f2/ALT-PU-2020-2541/definitions.json
2024-06-28 13:17:52 +00:00

105 lines
3.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202541",
"Version": "oval:org.altlinux.errata:def:20202541",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2541: package `libslirp` update to version 4.3.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2541",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2541",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-03600",
"RefURL": "https://bdu.fstec.ru/vul/2021-03600",
"Source": "BDU"
},
{
"RefID": "CVE-2020-10756",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10756",
"Source": "CVE"
}
],
"Description": "This update upgrades libslirp to version 4.3.1-alt1. \nSecurity Fix(es):\n\n * BDU:2021-03600: Уязвимость программного обеспечения для эмуляции аппаратного обеспечения QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * CVE-2020-10756: An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-08-12"
},
"Updated": {
"Date": "2020-08-12"
},
"BDUs": [
{
"ID": "BDU:2021-03600",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-03600",
"Impact": "Low",
"Public": "20200709"
}
],
"CVEs": [
{
"ID": "CVE-2020-10756",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10756",
"Impact": "Low",
"Public": "20200709"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202541001",
"Comment": "libslirp is earlier than 0:4.3.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202541002",
"Comment": "libslirp-devel is earlier than 0:4.3.1-alt1"
}
]
}
]
}
}
]
}