662 lines
35 KiB
JSON
662 lines
35 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20182344",
|
||
"Version": "oval:org.altlinux.errata:def:20182344",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-2344: package `ghostscript` update to version 9.25-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-2344",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2344",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01428",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01428",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01519",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01519",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00972",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00972",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01634",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01634",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03986",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03986",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04348",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04348",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04351",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04351",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04352",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04352",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01870",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01870",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01871",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01871",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01872",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01872",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05648",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05648",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10217",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10217",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10218",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10218",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10219",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10219",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10220",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10220",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10317",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10317",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7976",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7976",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7977",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7977",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7978",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7978",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7979",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7979",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-8602",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-8602",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9601",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9601",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-5951",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5951",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-7207",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7207",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-8291",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-8291",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10194",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10194",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-11645",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-11645",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-15908",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15908",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16511",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16511",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16539",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16539",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16540",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16540",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16541",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16541",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16542",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16542",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16543",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16543",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16585",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16585",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-16802",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16802",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17183",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17183",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17961",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17961",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades ghostscript to version 9.25-alt1. \nSecurity Fix(es):\n\n * BDU:2018-01428: Уязвимость функции set_text_distance компонента pdfwrite набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-01519: Уязвимость компонента Sandbox Protection Mechanism набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защитный механизм песочницы и выполнить произвольный код\n\n * BDU:2019-00972: Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками преобразования типов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-01634: Уязвимость библиотеки zfile.c интерпретатора PostScript/PDF Ghostscript, связанная с раскрытием информации, позволяющая нарушителю определить наличие и размер произвольных файлов\n\n * BDU:2019-03986: Уязвимость функции fill_threshhold_buffer (base/gxht_thresh.c) набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2019-04348: Уязвимость компонентов gssetresolution и gsgetresolution набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04351: Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04352: Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01870: Уязвимость реализации команды setdistillerkeys набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01871: Уязвимость встроенного конвертера PDF14 набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01872: Уязвимость компонента .tempfile набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защиту –dSAFER , удалить файлы или получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-05648: Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с недостатками преобразования типов данных, позволяющая нарушителю выполнить произвольные команды и обойти защиту –dSAFER\n\n * CVE-2016-10217: The pdf14_open function in base/gdevp14.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module.\n\n * CVE-2016-10218: The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.\n\n * CVE-2016-10219: The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.\n\n * CVE-2016-10220: The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module.\n\n * CVE-2016-10317: The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document.\n\n * CVE-2016-7976: The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attackers to execute arbitrary code via crafted userparams.\n\n * CVE-2016-7977: Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.\n\n * CVE-2016-7978: Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.\n\n * CVE-2016-7979: Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.\n\n * CVE-2016-8602: The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.\n\n * CVE-2016-9601: ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.\n\n * CVE-2017-5951: The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.\n\n * CVE-2017-7207: The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.\n\n * CVE-2017-8291: Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a \"/OutputFile (%pipe%\" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.\n\n * CVE-2018-10194: The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.\n\n * CVE-2018-11645: psi/zfile.c in Artifex Ghostscript before 9.21rc1 permits the status command even if -dSAFER is used, which might allow remote attackers to determine the existence and size of arbitrary files, a similar issue to CVE-2016-7977.\n\n * CVE-2018-15908: In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.\n\n * CVE-2018-16511: An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in \"ztype\" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.\n\n * CVE-2018-16539: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.\n\n * CVE-2018-16540: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.\n\n * CVE-2018-16541: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.\n\n * CVE-2018-16542: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.\n\n * CVE-2018-16543: In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.\n\n * CVE-2018-16585: An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193)\n\n * CVE-2018-16802: An issue was discovered in Artifex Ghostscript before 9.25. Incorrect \"restoration of privilege\" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the \"pipe\" instruction. This is due to an incomplete fix for CVE-2018-16509.\n\n * CVE-2018-17183: Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.\n\n * CVE-2018-17961: Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.\n\n * #35361: сборка 9.24-alt1 не работает",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-09-18"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-09-18"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2018-01428",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-252",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01428",
|
||
"Impact": "High",
|
||
"Public": "20180418"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01519",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01519",
|
||
"Impact": "High",
|
||
"Public": "20180928"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00972",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00972",
|
||
"Impact": "Critical",
|
||
"Public": "20180821"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01634",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01634",
|
||
"Impact": "Low",
|
||
"Public": "20161005"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03986",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03986",
|
||
"Impact": "Low",
|
||
"Public": "20170403"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04348",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-561",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04348",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04351",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04351",
|
||
"Impact": "High",
|
||
"Public": "20180910"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04352",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04352",
|
||
"Impact": "High",
|
||
"Public": "20180919"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01870",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01870",
|
||
"Impact": "High",
|
||
"Public": "20170511"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01871",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01871",
|
||
"Impact": "High",
|
||
"Public": "20180823"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01872",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01872",
|
||
"Impact": "High",
|
||
"Public": "20180821"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05648",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05648",
|
||
"Impact": "High",
|
||
"Public": "20170426"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2016-10217",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10217",
|
||
"Impact": "Low",
|
||
"Public": "20170403"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10218",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10218",
|
||
"Impact": "Low",
|
||
"Public": "20170403"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10219",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10219",
|
||
"Impact": "Low",
|
||
"Public": "20170403"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10220",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10220",
|
||
"Impact": "Low",
|
||
"Public": "20170403"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10317",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10317",
|
||
"Impact": "High",
|
||
"Public": "20170403"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7976",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7976",
|
||
"Impact": "High",
|
||
"Public": "20170807"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7977",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7977",
|
||
"Impact": "Low",
|
||
"Public": "20170523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7978",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7978",
|
||
"Impact": "Critical",
|
||
"Public": "20170523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7979",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7979",
|
||
"Impact": "Critical",
|
||
"Public": "20170523"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-8602",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-8602",
|
||
"Impact": "High",
|
||
"Public": "20170414"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9601",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9601",
|
||
"Impact": "Low",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-5951",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5951",
|
||
"Impact": "Low",
|
||
"Public": "20170403"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-7207",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7207",
|
||
"Impact": "Low",
|
||
"Public": "20170321"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-8291",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-8291",
|
||
"Impact": "High",
|
||
"Public": "20170427"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10194",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10194",
|
||
"Impact": "High",
|
||
"Public": "20180418"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-11645",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-11645",
|
||
"Impact": "Low",
|
||
"Public": "20180601"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-15908",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15908",
|
||
"Impact": "High",
|
||
"Public": "20180827"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16511",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-704",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16511",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16539",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16539",
|
||
"Impact": "Low",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16540",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16540",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16541",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16541",
|
||
"Impact": "Low",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16542",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16542",
|
||
"Impact": "Low",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16543",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16543",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16585",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16585",
|
||
"Impact": "High",
|
||
"Public": "20180906"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-16802",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16802",
|
||
"Impact": "High",
|
||
"Public": "20180910"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17183",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17183",
|
||
"Impact": "High",
|
||
"Public": "20180919"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17961",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-209",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17961",
|
||
"Impact": "High",
|
||
"Public": "20181015"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "35361",
|
||
"Href": "https://bugzilla.altlinux.org/35361",
|
||
"Data": "сборка 9.24-alt1 не работает"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344001",
|
||
"Comment": "ghostscript is earlier than 0:9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344002",
|
||
"Comment": "ghostscript-classic is earlier than 0:9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344003",
|
||
"Comment": "ghostscript-common is earlier than 0:9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344004",
|
||
"Comment": "ghostscript-gtk is earlier than 0:9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344005",
|
||
"Comment": "ghostscript-module-X is earlier than 0:9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344006",
|
||
"Comment": "ghostscript-utils is earlier than 0:9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344007",
|
||
"Comment": "libgs is earlier than 0:9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344008",
|
||
"Comment": "libgs-devel is earlier than 0:9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344009",
|
||
"Comment": "libijs is earlier than 0:0.35_9.25-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182344010",
|
||
"Comment": "libijs-devel is earlier than 0:9.25-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |