2024-01-10 07:45:25 +00:00

193 lines
8.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20192495",
"Version": "oval:org.altlinux.errata:def:20192495",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-2495: package `golang` update to version 1.12.9-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-2495",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2495",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02995",
"RefURL": "https://bdu.fstec.ru/vul/2019-02995",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02996",
"RefURL": "https://bdu.fstec.ru/vul/2019-02996",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03595",
"RefURL": "https://bdu.fstec.ru/vul/2019-03595",
"Source": "BDU"
},
{
"RefID": "CVE-2019-14809",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14809",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9512",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512",
"Source": "CVE"
},
{
"RefID": "CVE-2019-9514",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514",
"Source": "CVE"
}
],
"Description": "This update upgrades golang to version 1.12.9-alt1. \nSecurity Fix(es):\n\n * BDU:2019-02995: Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02996: Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03595: Уязвимость функции net/url языка программирования GO, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * CVE-2019-14809: net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.\n\n * CVE-2019-9512: Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.\n\n * CVE-2019-9514: Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2023 BaseALT Ltd.",
"Issued": {
"Date": "2019-08-19"
},
"Updated": {
"Date": "2019-08-19"
},
"bdu": [
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Cwe": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2019-02995",
"Impact": "High",
"Public": "20190813",
"CveID": "BDU:2019-02995"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Cwe": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2019-02996",
"Impact": "High",
"Public": "20190813",
"CveID": "BDU:2019-02996"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-03595",
"Impact": "Critical",
"Public": "20190813",
"CveID": "BDU:2019-03595"
}
],
"Cves": [
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14809",
"Impact": "Critical",
"Public": "20190813",
"CveID": "CVE-2019-14809"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Cwe": "CWE-400",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512",
"Impact": "High",
"Public": "20190813",
"CveID": "CVE-2019-9512"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Cwe": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514",
"Impact": "High",
"Public": "20190813",
"CveID": "CVE-2019-9514"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20192495001",
"Comment": "golang is earlier than 0:1.12.9-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192495002",
"Comment": "golang-docs is earlier than 0:1.12.9-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192495003",
"Comment": "golang-gdb is earlier than 0:1.12.9-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192495004",
"Comment": "golang-shared is earlier than 0:1.12.9-alt1"
}
]
}
]
}
}
]
}