vuln-list-alt/oval/p10/ALT-PU-2021-1148/definitions.json
2024-12-12 21:07:30 +00:00

135 lines
5.0 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211148",
"Version": "oval:org.altlinux.errata:def:20211148",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1148: package `trousers` update to version 0.3.15-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1148",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1148",
"Source": "ALTPU"
},
{
"RefID": "CVE-2020-24330",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24330",
"Source": "CVE"
},
{
"RefID": "CVE-2020-24331",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24331",
"Source": "CVE"
},
{
"RefID": "CVE-2020-24332",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24332",
"Source": "CVE"
}
],
"Description": "This update upgrades trousers to version 0.3.15-alt1. \nSecurity Fix(es):\n\n * CVE-2020-24330: An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.\n\n * CVE-2020-24331: An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).\n\n * CVE-2020-24332: An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-01-26"
},
"Updated": {
"Date": "2021-01-26"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2020-24330",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24330",
"Impact": "High",
"Public": "20200813"
},
{
"ID": "CVE-2020-24331",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24331",
"Impact": "High",
"Public": "20200813"
},
{
"ID": "CVE-2020-24332",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24332",
"Impact": "Low",
"Public": "20200813"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211148001",
"Comment": "libtrousers is earlier than 0:0.3.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211148002",
"Comment": "libtrousers-devel is earlier than 0:0.3.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211148003",
"Comment": "trousers is earlier than 0:0.3.15-alt1"
}
]
}
]
}
}
]
}