2024-06-28 13:17:52 +00:00

322 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171893",
"Version": "oval:org.altlinux.errata:def:20171893",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1893: package `systemd` update to version 234-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1893",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1893",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01575",
"RefURL": "https://bdu.fstec.ru/vul/2017-01575",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02107",
"RefURL": "https://bdu.fstec.ru/vul/2017-02107",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01640",
"RefURL": "https://bdu.fstec.ru/vul/2019-01640",
"Source": "BDU"
},
{
"RefID": "CVE-2017-1000082",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000082",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9217",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9217",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9445",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9445",
"Source": "CVE"
},
{
"RefID": "CVE-2018-1049",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1049",
"Source": "CVE"
}
],
"Description": "This update upgrades systemd to version 234-alt1. \nSecurity Fix(es):\n\n * BDU:2017-01575: Уязвимость функции dns_packet_new системного сервиса system-resolved менеджера Systemmd операционной системы Linux, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-02107: Уязвимость службы анализирования имен пользователей демона Systemd, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю запустить службу с root-привилегиями\n\n * BDU:2019-01640: Уязвимость демона Systemd, связанная с одновременным использованием общего ресурса и ошибками синхронизации, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-1000082: systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. \"0day\"), running the service in question with root privileges rather than the user intended.\n\n * CVE-2017-9217: systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.\n\n * CVE-2017-9445: In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.\n\n * CVE-2018-1049: In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like this may lead to denial of service, until mount points are unmounted.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-07-17"
},
"Updated": {
"Date": "2017-07-17"
},
"BDUs": [
{
"ID": "BDU:2017-01575",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-01575",
"Impact": "Critical",
"Public": "20170628"
},
{
"ID": "BDU:2017-02107",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2017-02107",
"Impact": "Critical",
"Public": "20170707"
},
{
"ID": "BDU:2019-01640",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2019-01640",
"Impact": "Low",
"Public": "20180216"
}
],
"CVEs": [
{
"ID": "CVE-2017-1000082",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000082",
"Impact": "Critical",
"Public": "20170707"
},
{
"ID": "CVE-2017-9217",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9217",
"Impact": "High",
"Public": "20170524"
},
{
"ID": "CVE-2017-9445",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9445",
"Impact": "High",
"Public": "20170628"
},
{
"ID": "CVE-2018-1049",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1049",
"Impact": "Low",
"Public": "20180216"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171893001",
"Comment": "bash-completion-journalctl is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893002",
"Comment": "bash-completion-systemd is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893003",
"Comment": "bash-completion-udev is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893004",
"Comment": "journalctl is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893005",
"Comment": "libnss-myhostname is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893006",
"Comment": "libnss-mymachines is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893007",
"Comment": "libnss-resolve is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893008",
"Comment": "libnss-systemd is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893009",
"Comment": "libsystemd is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893010",
"Comment": "libsystemd-devel is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893011",
"Comment": "libsystemd-shared is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893012",
"Comment": "libudev-devel is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893013",
"Comment": "libudev1 is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893014",
"Comment": "pam_systemd is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893015",
"Comment": "systemd is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893016",
"Comment": "systemd-analyze is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893017",
"Comment": "systemd-container is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893018",
"Comment": "systemd-coredump is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893019",
"Comment": "systemd-journal-gateway is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893020",
"Comment": "systemd-networkd is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893021",
"Comment": "systemd-services is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893022",
"Comment": "systemd-sysvinit is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893023",
"Comment": "systemd-timesyncd is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893024",
"Comment": "systemd-utils is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893025",
"Comment": "udev is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893026",
"Comment": "udev-extras is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893027",
"Comment": "udev-hwdb is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893028",
"Comment": "udev-rule-generator-cdrom is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893029",
"Comment": "udev-rule-generator-net is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893030",
"Comment": "udev-rules is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893031",
"Comment": "zsh-completion-journalctl is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893032",
"Comment": "zsh-completion-systemd is earlier than 1:234-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171893033",
"Comment": "zsh-completion-udev is earlier than 1:234-alt1"
}
]
}
]
}
}
]
}