2024-04-16 14:26:14 +00:00

557 lines
26 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20235823",
"Version": "oval:org.altlinux.errata:def:20235823",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-5823: package `wireshark` update to version 4.0.8-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-5823",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-5823",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-03347",
"RefURL": "https://bdu.fstec.ru/vul/2023-03347",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03609",
"RefURL": "https://bdu.fstec.ru/vul/2023-03609",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05022",
"RefURL": "https://bdu.fstec.ru/vul/2023-05022",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05695",
"RefURL": "https://bdu.fstec.ru/vul/2023-05695",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05711",
"RefURL": "https://bdu.fstec.ru/vul/2023-05711",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05712",
"RefURL": "https://bdu.fstec.ru/vul/2023-05712",
"Source": "BDU"
},
{
"RefID": "CVE-2022-3190",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3190",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3725",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4344",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4344",
"Source": "CVE"
},
{
"RefID": "CVE-2022-4345",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4345",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0411",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0411",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0412",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0412",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0413",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0413",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0415",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0415",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0416",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0416",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0417",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0417",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0666",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0666",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0667",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0667",
"Source": "CVE"
},
{
"RefID": "CVE-2023-0668",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0668",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1161",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1161",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1992",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1992",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1993",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1993",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1994",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1994",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2854",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2854",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2855",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2855",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2856",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2856",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2857",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2857",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2858",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2858",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2879",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2879",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2906",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2906",
"Source": "CVE"
},
{
"RefID": "CVE-2023-2952",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-2952",
"Source": "CVE"
},
{
"RefID": "CVE-2023-3648",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-3648",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4511",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4511",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4513",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4513",
"Source": "CVE"
}
],
"Description": "This update upgrades wireshark to version 4.0.8-alt1. \nSecurity Fix(es):\n\n * BDU:2023-03347: Уязвимость диссектора RPCoRDMA анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-03609: Уязвимость диссектора LISP анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-05022: Уязвимость компонента CP2179 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-05695: Уязвимость анализатора трафика компьютерных сетей Wireshark , связанная с несогласованным управлением памятью, , позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-05711: Уязвимость анализатора трафика компьютерных сетей Wireshark, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-05712: Уязвимость анализатора трафика компьютерных сетей Wireshark , связанная с ошибкой освобождения памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2022-3190: Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file\n\n * CVE-2022-3725: Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file\n\n * CVE-2022-4344: Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file\n\n * CVE-2022-4345: Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-0411: Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-0412: TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-0413: Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-0415: iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-0416: GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-0417: Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-0666: Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.\n\n * CVE-2023-0667: Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark\n\n * CVE-2023-0668: Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.\n\n * CVE-2023-1161: ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-1992: RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-1993: LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-1994: GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-2854: BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file\n\n * CVE-2023-2855: Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file\n\n * CVE-2023-2856: VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file\n\n * CVE-2023-2857: BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file\n\n * CVE-2023-2858: NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file\n\n * CVE-2023-2879: GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-2906: Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.\n\n\n * CVE-2023-2952: XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-3648: Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-4511: BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file\n\n * CVE-2023-4513: BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-09-24"
},
"Updated": {
"Date": "2023-09-24"
},
"BDUs": [
{
"ID": "BDU:2023-03347",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20, CWE-400",
"Href": "https://bdu.fstec.ru/vul/2023-03347",
"Impact": "High",
"Public": "20230412"
},
{
"ID": "BDU:2023-03609",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-400, CWE-834",
"Href": "https://bdu.fstec.ru/vul/2023-03609",
"Impact": "Low",
"Public": "20230412"
},
{
"ID": "BDU:2023-05022",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://bdu.fstec.ru/vul/2023-05022",
"Impact": "High",
"Public": "20230824"
},
{
"ID": "BDU:2023-05695",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-762",
"Href": "https://bdu.fstec.ru/vul/2023-05695",
"Impact": "Low",
"Public": "20230714"
},
{
"ID": "BDU:2023-05711",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2023-05711",
"Impact": "High",
"Public": "20230824"
},
{
"ID": "BDU:2023-05712",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2023-05712",
"Impact": "High",
"Public": "20230824"
}
],
"CVEs": [
{
"ID": "CVE-2022-3190",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3190",
"Impact": "Low",
"Public": "20220913"
},
{
"ID": "CVE-2022-3725",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3725",
"Impact": "High",
"Public": "20221027"
},
{
"ID": "CVE-2022-4344",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4344",
"Impact": "Low",
"Public": "20230112"
},
{
"ID": "CVE-2022-4345",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4345",
"Impact": "Low",
"Public": "20230112"
},
{
"ID": "CVE-2023-0411",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-834",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0411",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0412",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0412",
"Impact": "High",
"Public": "20230126"
},
{
"ID": "CVE-2023-0413",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0413",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0415",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0415",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0416",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0416",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0417",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0417",
"Impact": "Low",
"Public": "20230126"
},
{
"ID": "CVE-2023-0666",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0666",
"Impact": "Low",
"Public": "20230607"
},
{
"ID": "CVE-2023-0667",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0667",
"Impact": "Low",
"Public": "20230607"
},
{
"ID": "CVE-2023-0668",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0668",
"Impact": "Low",
"Public": "20230607"
},
{
"ID": "CVE-2023-1161",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1161",
"Impact": "High",
"Public": "20230306"
},
{
"ID": "CVE-2023-1992",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1992",
"Impact": "High",
"Public": "20230412"
},
{
"ID": "CVE-2023-1993",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-834",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1993",
"Impact": "Low",
"Public": "20230412"
},
{
"ID": "CVE-2023-1994",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1994",
"Impact": "Low",
"Public": "20230412"
},
{
"ID": "CVE-2023-2854",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2854",
"Impact": "Low",
"Public": "20230526"
},
{
"ID": "CVE-2023-2855",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2855",
"Impact": "Low",
"Public": "20230526"
},
{
"ID": "CVE-2023-2856",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2856",
"Impact": "Low",
"Public": "20230526"
},
{
"ID": "CVE-2023-2857",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2857",
"Impact": "Low",
"Public": "20230526"
},
{
"ID": "CVE-2023-2858",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2858",
"Impact": "Low",
"Public": "20230526"
},
{
"ID": "CVE-2023-2879",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2879",
"Impact": "High",
"Public": "20230526"
},
{
"ID": "CVE-2023-2906",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2906",
"Impact": "Low",
"Public": "20230825"
},
{
"ID": "CVE-2023-2952",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-2952",
"Impact": "Low",
"Public": "20230530"
},
{
"ID": "CVE-2023-3648",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-3648",
"Impact": "Low",
"Public": "20230714"
},
{
"ID": "CVE-2023-4511",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4511",
"Impact": "High",
"Public": "20230824"
},
{
"ID": "CVE-2023-4513",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4513",
"Impact": "High",
"Public": "20230824"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20235823001",
"Comment": "tshark is earlier than 0:4.0.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235823002",
"Comment": "wireshark-base is earlier than 0:4.0.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235823003",
"Comment": "wireshark-devel is earlier than 0:4.0.8-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235823004",
"Comment": "wireshark-qt5 is earlier than 0:4.0.8-alt1"
}
]
}
]
}
}
]
}