vuln-list-alt/oval/p9/ALT-PU-2018-1376/definitions.json
2024-06-28 13:17:52 +00:00

197 lines
8.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20181376",
"Version": "oval:org.altlinux.errata:def:20181376",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-1376: package `quagga` update to version 1.2.4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-1376",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1376",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01781",
"RefURL": "https://bdu.fstec.ru/vul/2019-01781",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03925",
"RefURL": "https://bdu.fstec.ru/vul/2019-03925",
"Source": "BDU"
},
{
"RefID": "CVE-2018-5378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5378",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5379",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5380",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5380",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5381",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5381",
"Source": "CVE"
}
],
"Description": "This update upgrades quagga to version 1.2.4-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01781: Уязвимость реализации протокола BGP программного обеспечения Quagga, связанная с повторным освобождением памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-03925: Уязвимость демона bgpd пакета программ Quagga, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-5378: The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.\n\n * CVE-2018-5379: The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.\n\n * CVE-2018-5380: The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.\n\n * CVE-2018-5381: The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of \"Capabilities\" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-03-06"
},
"Updated": {
"Date": "2018-03-06"
},
"BDUs": [
{
"ID": "BDU:2019-01781",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2019-01781",
"Impact": "Critical",
"Public": "20180219"
},
{
"ID": "BDU:2019-03925",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-03925",
"Impact": "Low",
"Public": "20180219"
}
],
"CVEs": [
{
"ID": "CVE-2018-5378",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5378",
"Impact": "Low",
"Public": "20180219"
},
{
"ID": "CVE-2018-5379",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379",
"Impact": "Critical",
"Public": "20180219"
},
{
"ID": "CVE-2018-5380",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5380",
"Impact": "Low",
"Public": "20180219"
},
{
"ID": "CVE-2018-5381",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5381",
"Impact": "High",
"Public": "20180219"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20181376001",
"Comment": "libquagga is earlier than 0:1.2.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181376002",
"Comment": "quagga is earlier than 0:1.2.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181376003",
"Comment": "quagga-devel is earlier than 0:1.2.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181376004",
"Comment": "quagga-doc is earlier than 0:1.2.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181376005",
"Comment": "quagga-ospfclient is earlier than 0:1.2.4-alt1"
}
]
}
]
}
}
]
}