vuln-list-alt/oval/c9f2/ALT-PU-2020-2900/definitions.json
2024-06-28 13:17:52 +00:00

235 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202900",
"Version": "oval:org.altlinux.errata:def:20202900",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2900: package `opensc` update to version 0.20.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2900",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2900",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00268",
"RefURL": "https://bdu.fstec.ru/vul/2022-00268",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00271",
"RefURL": "https://bdu.fstec.ru/vul/2022-00271",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00273",
"RefURL": "https://bdu.fstec.ru/vul/2022-00273",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00332",
"RefURL": "https://bdu.fstec.ru/vul/2022-00332",
"Source": "BDU"
},
{
"RefID": "CVE-2019-15945",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15945",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15946",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15946",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19479",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19479",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19480",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19480",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19481",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19481",
"Source": "CVE"
},
{
"RefID": "CVE-2019-20792",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-20792",
"Source": "CVE"
},
{
"RefID": "CVE-2019-6502",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6502",
"Source": "CVE"
}
],
"Description": "This update upgrades opensc to version 0.20.0-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00268: Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00271: Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-00273: Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00332: Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2019-15945: OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c.\n\n * CVE-2019-15946: OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c.\n\n * CVE-2019-19479: An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute.\n\n * CVE-2019-19480: An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry.\n\n * CVE-2019-19481: An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-cac1.c mishandles buffer limits for CAC certificates.\n\n * CVE-2019-20792: OpenSC before 0.20.0 has a double free in coolkey_free_private_data because coolkey_add_object in libopensc/card-coolkey.c lacks a uniqueness check.\n\n * CVE-2019-6502: sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-09-30"
},
"Updated": {
"Date": "2020-09-30"
},
"BDUs": [
{
"ID": "BDU:2022-00268",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-00268",
"Impact": "Low",
"Public": "20190907"
},
{
"ID": "BDU:2022-00271",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-00271",
"Impact": "Low",
"Public": "20191225"
},
{
"ID": "BDU:2022-00273",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2022-00273",
"Impact": "High",
"Public": "20190122"
},
{
"ID": "BDU:2022-00332",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-00332",
"Impact": "Low",
"Public": "20190907"
}
],
"CVEs": [
{
"ID": "CVE-2019-15945",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15945",
"Impact": "Low",
"Public": "20190905"
},
{
"ID": "CVE-2019-15946",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15946",
"Impact": "Low",
"Public": "20190905"
},
{
"ID": "CVE-2019-19479",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19479",
"Impact": "Low",
"Public": "20191201"
},
{
"ID": "CVE-2019-19480",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-672",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19480",
"Impact": "Low",
"Public": "20191201"
},
{
"ID": "CVE-2019-19481",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19481",
"Impact": "Low",
"Public": "20191201"
},
{
"ID": "CVE-2019-20792",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-20792",
"Impact": "Low",
"Public": "20200429"
},
{
"ID": "CVE-2019-6502",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6502",
"Impact": "High",
"Public": "20190122"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202900001",
"Comment": "libopensc is earlier than 0:0.20.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202900002",
"Comment": "libopensc-devel is earlier than 0:0.20.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202900003",
"Comment": "opensc is earlier than 0:0.20.0-alt1"
}
]
}
]
}
}
]
}