2024-12-12 21:07:30 +00:00

428 lines
23 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171822",
"Version": "oval:org.altlinux.errata:def:20171822",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1822: package `php7` update to version 7.1.7-alt1.S1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1822",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1822",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-01714",
"RefURL": "https://bdu.fstec.ru/vul/2017-01714",
"Source": "BDU"
},
{
"RefID": "BDU:2017-01838",
"RefURL": "https://bdu.fstec.ru/vul/2017-01838",
"Source": "BDU"
},
{
"RefID": "BDU:2017-01839",
"RefURL": "https://bdu.fstec.ru/vul/2017-01839",
"Source": "BDU"
},
{
"RefID": "BDU:2017-01840",
"RefURL": "https://bdu.fstec.ru/vul/2017-01840",
"Source": "BDU"
},
{
"RefID": "BDU:2017-01841",
"RefURL": "https://bdu.fstec.ru/vul/2017-01841",
"Source": "BDU"
},
{
"RefID": "BDU:2017-01843",
"RefURL": "https://bdu.fstec.ru/vul/2017-01843",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02023",
"RefURL": "https://bdu.fstec.ru/vul/2017-02023",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00008",
"RefURL": "https://bdu.fstec.ru/vul/2018-00008",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02420",
"RefURL": "https://bdu.fstec.ru/vul/2022-02420",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02421",
"RefURL": "https://bdu.fstec.ru/vul/2022-02421",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02422",
"RefURL": "https://bdu.fstec.ru/vul/2022-02422",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02424",
"RefURL": "https://bdu.fstec.ru/vul/2022-02424",
"Source": "BDU"
},
{
"RefID": "CVE-2017-11144",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11144",
"Source": "CVE"
},
{
"RefID": "CVE-2017-11145",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11145",
"Source": "CVE"
},
{
"RefID": "CVE-2017-11362",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11362",
"Source": "CVE"
},
{
"RefID": "CVE-2017-11628",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11628",
"Source": "CVE"
},
{
"RefID": "CVE-2017-12933",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12933",
"Source": "CVE"
},
{
"RefID": "CVE-2017-12934",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12934",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7890",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7890",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9224",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9224",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9226",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9226",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9227",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9227",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9228",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9228",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9229",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9229",
"Source": "CVE"
}
],
"Description": "This update upgrades php7 to version 7.1.7-alt1.S1. \nSecurity Fix(es):\n\n * BDU:2017-01714: Уязвимость функции msgfmt_parse_message интерпретатора PHP, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2017-01838: Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти\n\n * BDU:2017-01839: Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти\n\n * BDU:2017-01840: Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая нарушителю осуществить чтение за границами буфера в динамической памяти\n\n * BDU:2017-01841: Уязвимость библиотеки Oniguruma, связанная с некорректной обработкой чисел и позволяющая нарушителю вызвать повреждение памяти\n\n * BDU:2017-01843: Уязвимость библиотеки Oniguruma, позволяющая нарушителю оказать влияние на доступность информации\n\n * BDU:2017-02023: Уязвимость функции finish_nested_data интерпретатора PHP, позволяющая нарушителю оказать неопределенное воздействие на целостность данных\n\n * BDU:2018-00008: Уязвимость функции GIF-декодирования gdImageCreateFromGifCtx (gd_gif_in.c) библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю нарушить конфиденциальность информации\n\n * BDU:2022-02420: Уязвимость компонента ext/standard/var_unserializer.re интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2022-02421: Уязвимость функции zend_ini_do_op() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный PHP-код\n\n * BDU:2022-02422: Уязвимость функции timelib_meridian() интерпретатора языка программирования PHP, позволяющая нарушителю оказать воздействие на конфиденциальность информации\n\n * BDU:2022-02424: Уязвимость расширения openssl (ext/openssl/openssl.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-11144: In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.\n\n * CVE-2017-11145: In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.\n\n * CVE-2017-11362: In PHP 7.x before 7.0.21 and 7.1.x before 7.1.7, ext/intl/msgformat/msgformat_parse.c does not restrict the locale length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact within International Components for Unicode (ICU) for C/C++ via a long first argument to the msgfmt_parse_message function.\n\n * CVE-2017-11628: In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.\n\n * CVE-2017-12933: The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.\n\n * CVE-2017-12934: ext/standard/var_unserializer.re in PHP 7.0.x before 7.0.21 and 7.1.x before 7.1.7 is prone to a heap use after free while unserializing untrusted data, related to the zval_get_type function in Zend/zend_types.h. Exploitation of this issue can have an unspecified impact on the integrity of PHP.\n\n * CVE-2017-7890: The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.\n\n * CVE-2017-9224: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.\n\n * CVE-2017-9226: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.\n\n * CVE-2017-9227: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg-\u003edmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.\n\n * CVE-2017-9228: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.\n\n * CVE-2017-9229: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg-\u003edmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-07-08"
},
"Updated": {
"Date": "2017-07-08"
},
"BDUs": [
{
"ID": "BDU:2017-01714",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-01714",
"Impact": "High",
"Public": "20170717"
},
{
"ID": "BDU:2017-01838",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2017-01838",
"Impact": "High",
"Public": "20170523"
},
{
"ID": "BDU:2017-01839",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2017-01839",
"Impact": "High",
"Public": "20170524"
},
{
"ID": "BDU:2017-01840",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2017-01840",
"Impact": "High",
"Public": "20170522"
},
{
"ID": "BDU:2017-01841",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-125, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2017-01841",
"Impact": "High",
"Public": "20170518"
},
{
"ID": "BDU:2017-01843",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2017-01843",
"Impact": "High",
"Public": "20170522"
},
{
"ID": "BDU:2017-02023",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2017-02023",
"Impact": "High",
"Public": "20170216"
},
{
"ID": "BDU:2018-00008",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00008",
"Impact": "Low",
"Public": "20170413"
},
{
"ID": "BDU:2022-02420",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02420",
"Impact": "High",
"Public": "20170818"
},
{
"ID": "BDU:2022-02421",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-02421",
"Impact": "High",
"Public": "20170725"
},
{
"ID": "BDU:2022-02422",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2022-02422",
"Impact": "High",
"Public": "20170710"
},
{
"ID": "BDU:2022-02424",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-754",
"Href": "https://bdu.fstec.ru/vul/2022-02424",
"Impact": "High",
"Public": "20170710"
}
],
"CVEs": [
{
"ID": "CVE-2017-11144",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11144",
"Impact": "High",
"Public": "20170710"
},
{
"ID": "CVE-2017-11145",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11145",
"Impact": "High",
"Public": "20170710"
},
{
"ID": "CVE-2017-11362",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11362",
"Impact": "Critical",
"Public": "20170717"
},
{
"ID": "CVE-2017-11628",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11628",
"Impact": "High",
"Public": "20170725"
},
{
"ID": "CVE-2017-12933",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12933",
"Impact": "Critical",
"Public": "20170818"
},
{
"ID": "CVE-2017-12934",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12934",
"Impact": "High",
"Public": "20170818"
},
{
"ID": "CVE-2017-7890",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7890",
"Impact": "Low",
"Public": "20170802"
},
{
"ID": "CVE-2017-9224",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9224",
"Impact": "Critical",
"Public": "20170524"
},
{
"ID": "CVE-2017-9226",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9226",
"Impact": "Critical",
"Public": "20170524"
},
{
"ID": "CVE-2017-9227",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9227",
"Impact": "Critical",
"Public": "20170524"
},
{
"ID": "CVE-2017-9228",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9228",
"Impact": "Critical",
"Public": "20170524"
},
{
"ID": "CVE-2017-9229",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9229",
"Impact": "High",
"Public": "20170524"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171822001",
"Comment": "php7 is earlier than 0:7.1.7-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171822002",
"Comment": "php7-devel is earlier than 0:7.1.7-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171822003",
"Comment": "php7-libs is earlier than 0:7.1.7-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171822004",
"Comment": "php7-mysqlnd is earlier than 0:7.1.7-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171822005",
"Comment": "rpm-build-php7-version is earlier than 0:7.1.7-alt1.S1"
}
]
}
]
}
}
]
}