vuln-list-alt/oval/p10/ALT-PU-2023-1172/definitions.json
2024-12-12 21:07:30 +00:00

216 lines
9.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20231172",
"Version": "oval:org.altlinux.errata:def:20231172",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-1172: package `libxml2` update to version 2.9.12-alt1.p10.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-1172",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1172",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-01453",
"RefURL": "https://bdu.fstec.ru/vul/2022-01453",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03033",
"RefURL": "https://bdu.fstec.ru/vul/2022-03033",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06700",
"RefURL": "https://bdu.fstec.ru/vul/2022-06700",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06701",
"RefURL": "https://bdu.fstec.ru/vul/2022-06701",
"Source": "BDU"
},
{
"RefID": "CVE-2022-23308",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308",
"Source": "CVE"
},
{
"RefID": "CVE-2022-29824",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-29824",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40303",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40303",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40304",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40304",
"Source": "CVE"
}
],
"Description": "This update upgrades libxml2 to version 2.9.12-alt1.p10.1. \nSecurity Fix(es):\n\n * BDU:2022-01453: Уязвимость файла valid.c библиотеки анализа XML-документов libxml2, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-03033: Уязвимость компонентов buf.c и tree.c библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-06700: Уязвимость функции очистки объекта XML библиотеки анализа XML-документов libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-06701: Уязвимость функции xmlParseNameComplex() библиотеки анализа XML-документов libxml2, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * CVE-2022-23308: valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.\n\n * CVE-2022-29824: In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.\n\n * CVE-2022-40303: An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.\n\n * CVE-2022-40304: An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-02-02"
},
"Updated": {
"Date": "2023-02-02"
},
"BDUs": [
{
"ID": "BDU:2022-01453",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01453",
"Impact": "Critical",
"Public": "20220219"
},
{
"ID": "BDU:2022-03033",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-190, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-03033",
"Impact": "Low",
"Public": "20220308"
},
{
"ID": "BDU:2022-06700",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-399, CWE-415",
"Href": "https://bdu.fstec.ru/vul/2022-06700",
"Impact": "High",
"Public": "20220831"
},
{
"ID": "BDU:2022-06701",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-06701",
"Impact": "High",
"Public": "20220622"
}
],
"CVEs": [
{
"ID": "CVE-2022-23308",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308",
"Impact": "High",
"Public": "20220226"
},
{
"ID": "CVE-2022-29824",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-29824",
"Impact": "Low",
"Public": "20220503"
},
{
"ID": "CVE-2022-40303",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40303",
"Impact": "High",
"Public": "20221123"
},
{
"ID": "CVE-2022-40304",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40304",
"Impact": "High",
"Public": "20221123"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20231172001",
"Comment": "libxml2 is earlier than 1:2.9.12-alt1.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231172002",
"Comment": "libxml2-devel is earlier than 1:2.9.12-alt1.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231172003",
"Comment": "libxml2-doc is earlier than 1:2.9.12-alt1.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231172004",
"Comment": "python-module-libxml2 is earlier than 1:2.9.12-alt1.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231172005",
"Comment": "python3-module-libxml2 is earlier than 1:2.9.12-alt1.p10.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231172006",
"Comment": "xml-utils is earlier than 1:2.9.12-alt1.p10.1"
}
]
}
]
}
}
]
}