2024-04-16 14:26:14 +00:00

227 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20231002",
"Version": "oval:org.altlinux.errata:def:20231002",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-1002: package `libcairo` update to version 1.16.0-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-1002",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1002",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-01641",
"RefURL": "https://bdu.fstec.ru/vul/2016-01641",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03445",
"RefURL": "https://bdu.fstec.ru/vul/2021-03445",
"Source": "BDU"
},
{
"RefID": "CVE-2014-5116",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-5116",
"Source": "CVE"
},
{
"RefID": "CVE-2016-3190",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3190",
"Source": "CVE"
},
{
"RefID": "CVE-2016-9082",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9082",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7475",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7475",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9814",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9814",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18064",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18064",
"Source": "CVE"
},
{
"RefID": "CVE-2018-19876",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19876",
"Source": "CVE"
},
{
"RefID": "CVE-2020-35492",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35492",
"Source": "CVE"
}
],
"Description": "This update upgrades libcairo to version 1.16.0-alt2. \nSecurity Fix(es):\n\n * BDU:2016-01641: Уязвимость библиотеки векторной графики Cairo, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03445: Уязвимость компонента image-compositor.c библиотеки векторной графики Cairo, связанная с переполнением буфера стека данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2014-5116: The cairo_image_surface_get_data function in Cairo 1.10.2, as used in GTK+ and Wireshark, allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a large string.\n\n * CVE-2016-3190: The fill_xrgb32_lerp_opaque_spans function in cairo-image-compositor.c in cairo before 1.14.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a negative span length.\n\n * CVE-2016-9082: Integer overflow in the write_png function in cairo 1.14.6 allows remote attackers to cause a denial of service (invalid pointer dereference) via a large svg file.\n\n * CVE-2017-7475: Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.\n\n * CVE-2017-9814: cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call.\n\n * CVE-2018-18064: cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function).\n\n * CVE-2018-19876: cairo 1.16.0, in cairo_ft_apply_variations() in cairo-ft-font.c, would free memory using a free function incompatible with WebKit's fastMalloc, leading to an application crash with a \"free(): invalid pointer\" error.\n\n * CVE-2020-35492: A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -\u003e out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-01-03"
},
"Updated": {
"Date": "2024-04-04"
},
"BDUs": [
{
"ID": "BDU:2016-01641",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01641",
"Impact": "Low",
"Public": "20160421"
},
{
"ID": "BDU:2021-03445",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-121",
"Href": "https://bdu.fstec.ru/vul/2021-03445",
"Impact": "High",
"Public": "20201202"
}
],
"CVEs": [
{
"ID": "CVE-2014-5116",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-5116",
"Impact": "Low",
"Public": "20140729"
},
{
"ID": "CVE-2016-3190",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3190",
"Impact": "High",
"Public": "20160421"
},
{
"ID": "CVE-2016-9082",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9082",
"Impact": "Low",
"Public": "20170203"
},
{
"ID": "CVE-2017-7475",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7475",
"Impact": "Low",
"Public": "20170519"
},
{
"ID": "CVE-2017-9814",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9814",
"Impact": "High",
"Public": "20170717"
},
{
"ID": "CVE-2018-18064",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18064",
"Impact": "Low",
"Public": "20181008"
},
{
"ID": "CVE-2018-19876",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19876",
"Impact": "Low",
"Public": "20181205"
},
{
"ID": "CVE-2020-35492",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35492",
"Impact": "High",
"Public": "20210318"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20231002001",
"Comment": "libcairo is earlier than 1:1.16.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231002002",
"Comment": "libcairo-devel is earlier than 1:1.16.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231002003",
"Comment": "libcairo-gobject is earlier than 1:1.16.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231002004",
"Comment": "libcairo-gobject-devel is earlier than 1:1.16.0-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231002005",
"Comment": "libcairo-tools is earlier than 1:1.16.0-alt2"
}
]
}
]
}
}
]
}