118 lines
4.1 KiB
JSON
118 lines
4.1 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20223067",
|
|
"Version": "oval:org.altlinux.errata:def:20223067",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2022-3067: package `arj` update to version 3.10.22-alt9",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2022-3067",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-3067",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0556",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0556",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0557",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0557",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2782",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2782",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades arj to version 3.10.22-alt9. \nSecurity Fix(es):\n\n * CVE-2015-0556: Open-source ARJ archiver 3.10.22 allows remote attackers to conduct directory traversal attacks via a symlink attack in an ARJ archive.\n\n * CVE-2015-0557: Open-source ARJ archiver 3.10.22 does not properly remove leading slashes from paths, which allows remote attackers to conduct absolute path traversal attacks and write to arbitrary files via multiple leading slashes in a path in an ARJ archive.\n\n * CVE-2015-2782: Buffer overflow in Open-source ARJ archiver 3.10.22 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ARJ archive.\n\n * #44143: Зависает при создании архивов",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2022-11-13"
|
|
},
|
|
"Updated": {
|
|
"Date": "2022-11-13"
|
|
},
|
|
"BDUs": null,
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2015-0556",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
|
"CWE": "CWE-59",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0556",
|
|
"Impact": "Low",
|
|
"Public": "20150408"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0557",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
|
"CWE": "CWE-22",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0557",
|
|
"Impact": "Low",
|
|
"Public": "20150408"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2782",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2782",
|
|
"Impact": "High",
|
|
"Public": "20150408"
|
|
}
|
|
],
|
|
"Bugzilla": [
|
|
{
|
|
"ID": "44143",
|
|
"Href": "https://bugzilla.altlinux.org/44143",
|
|
"Data": "Зависает при создании архивов"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20223067001",
|
|
"Comment": "arj is earlier than 1:3.10.22-alt9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |