678 lines
40 KiB
JSON
678 lines
40 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20181696",
|
||
"Version": "oval:org.altlinux.errata:def:20181696",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-1696: package `blender` update to version 2.79b-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p10"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit",
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-1696",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1696",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00507",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00507",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04047",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04047",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04048",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04048",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04049",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04049",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04050",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04050",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04051",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04051",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04052",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04052",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04053",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04053",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04054",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04054",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04055",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04055",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04162",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04162",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04163",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04163",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04164",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04164",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04165",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04165",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04166",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04166",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04167",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04167",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04168",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04168",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04169",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04169",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04170",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04170",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04171",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04171",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04172",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04172",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12081",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12081",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12082",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12082",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12086",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12086",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12099",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12099",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12100",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12100",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12101",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12101",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12102",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12102",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12103",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12103",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12104",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12104",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-12105",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-12105",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2899",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2899",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2900",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2900",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2901",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2901",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2902",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2902",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2903",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2903",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2904",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2904",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2905",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2905",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2906",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2906",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2907",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2907",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2908",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2908",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-2918",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-2918",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades blender to version 2.79b-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00507: Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, связанная с целочисленным переполнением при обработке .blend-файла, позволяющая нарушителю выполнить код в контексте приложения\n\n * BDU:2019-04047: Уязвимость компонента Mesh набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04048: Уязвимость компонента CustomData набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04049: Уязвимость компонента BKE_mesh_calc_normals_tessface набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04050: Уязвимость компонента tface набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04051: Уязвимость компонента multires_load_old_dm набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04052: Уязвимость компонента modifier_mdef_compact_influences набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04053: Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04054: Уязвимость компонента Particle набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04055: Уязвимость компонента Mesh набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04162: Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04163: Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04164: Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04165: Уязвимость модуля DPX набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04166: Уязвимость модуля DPX набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04167: Уязвимость модуля RADIANCE набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04168: Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04169: Уязвимость функции воспроизведения анимации набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04170: Уязвимость функции воспроизведения анимации набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04171: Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04172: Уязвимость модуля загрузки изображений набора программного обеспечения для создания трехмерной компьютерной графики Blender, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2017-12081: An exploitable integer overflow exists in the upgrade of a legacy Mesh attribute of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.\n\n * CVE-2017-12082: An exploitable integer overflow exists in the 'CustomData' Mesh loading functionality of the Blender open-source 3d creation suite. A .blend file with a specially crafted external data file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to edit an object within a .blend library in their Scene in order to trigger this vulnerability.\n\n * CVE-2017-12086: An exploitable integer overflow exists in the 'BKE_mesh_calc_normals_tessface' functionality of the Blender open-source 3d creation suite. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability.\n\n * CVE-2017-12099: An exploitable integer overflow exists in the upgrade of the legacy Mesh attribute 'tface' of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.\n\n * CVE-2017-12100: An exploitable integer overflow exists in the 'multires_load_old_dm' functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability.\n\n * CVE-2017-12101: An exploitable integer overflow exists in the 'modifier_mdef_compact_influences' functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability.\n\n * CVE-2017-12102: An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.\n\n * CVE-2017-12103: An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts text rendered as a font into a curve. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.\n\n * CVE-2017-12104: An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.\n\n * CVE-2017-12105: An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c applies a particular object modifier to a Mesh. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.\n\n * CVE-2017-2899: An exploitable integer overflow exists in the TIFF loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.tif' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.\n\n * CVE-2017-2900: An exploitable integer overflow exists in the PNG loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.png' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.\n\n * CVE-2017-2901: An exploitable integer overflow exists in the IRIS loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.iris' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.\n\n * CVE-2017-2902: An exploitable integer overflow exists in the DPX loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.cin' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.\n\n * CVE-2017-2903: An exploitable integer overflow exists in the DPX loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.cin' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.\n\n * CVE-2017-2904: An exploitable integer overflow exists in the RADIANCE loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.hdr' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.\n\n * CVE-2017-2905: An exploitable integer overflow exists in the bmp loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.bmp' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.\n\n * CVE-2017-2906: An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset in order to trigger this vulnerability.\n\n * CVE-2017-2907: An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset in order to trigger this vulnerability.\n\n * CVE-2017-2908: An exploitable integer overflow exists in the thumbnail functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to render the thumbnail for the file while in the File-\u003eOpen dialog.\n\n * CVE-2017-2918: An exploitable integer overflow exists in the Image loading functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-05-11"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-05-11"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-00507",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00507",
|
||
"Impact": "High",
|
||
"Public": "20180111"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04047",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04047",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04048",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04048",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04049",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04049",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04050",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04050",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04051",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04051",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04052",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04052",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04053",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04053",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04054",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04054",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04055",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04055",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04162",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04162",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04163",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04163",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04164",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04164",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04165",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04165",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04166",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04166",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04167",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04167",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04168",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04168",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04169",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04169",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04170",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04170",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04171",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04171",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04172",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04172",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2017-12081",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12081",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12082",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12082",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12086",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12086",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12099",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12099",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12100",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12100",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12101",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12101",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12102",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12102",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12103",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12103",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12104",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12104",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-12105",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-12105",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2899",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2899",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2900",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2900",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2901",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2901",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2902",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2902",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2903",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2903",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2904",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2904",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2905",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2905",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2906",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2906",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2907",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2907",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2908",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2908",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-2918",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-2918",
|
||
"Impact": "High",
|
||
"Public": "20180424"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:10",
|
||
"cpe:/o:alt:workstation:10",
|
||
"cpe:/o:alt:server:10",
|
||
"cpe:/o:alt:server-v:10",
|
||
"cpe:/o:alt:education:10",
|
||
"cpe:/o:alt:slinux:10",
|
||
"cpe:/o:alt:starterkit:10",
|
||
"cpe:/o:alt:starterkit:p10",
|
||
"cpe:/o:alt:container:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181696001",
|
||
"Comment": "blender is earlier than 0:2.79b-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20181696002",
|
||
"Comment": "blender-i18n is earlier than 0:2.79b-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |