vuln-list-alt/oval/p10/ALT-PU-2023-4713/definitions.json
2024-12-12 21:07:30 +00:00

207 lines
8.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20234713",
"Version": "oval:org.altlinux.errata:def:20234713",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-4713: package `powershell` update to version 7.3.6-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-4713",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-4713",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-01775",
"RefURL": "https://bdu.fstec.ru/vul/2021-01775",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03282",
"RefURL": "https://bdu.fstec.ru/vul/2022-03282",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05512",
"RefURL": "https://bdu.fstec.ru/vul/2022-05512",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05516",
"RefURL": "https://bdu.fstec.ru/vul/2022-05516",
"Source": "BDU"
},
{
"RefID": "CVE-2020-8927",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8927",
"Source": "CVE"
},
{
"RefID": "CVE-2022-23267",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-23267",
"Source": "CVE"
},
{
"RefID": "CVE-2022-24512",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-24512",
"Source": "CVE"
},
{
"RefID": "CVE-2022-26788",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26788",
"Source": "CVE"
},
{
"RefID": "CVE-2022-34716",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-34716",
"Source": "CVE"
}
],
"Description": "This update upgrades powershell to version 7.3.6-alt1. \nSecurity Fix(es):\n\n * BDU:2021-01775: Уязвимость алгоритма сжатия данных Brotli, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании\n\n * BDU:2022-03282: Уязвимость интерпретатора команд PowerShell, связанная с недостатками разграничения доступа, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05512: Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05516: Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2020-8927: A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.\n\n * CVE-2022-23267: .NET and Visual Studio Denial of Service Vulnerability\n\n * CVE-2022-24512: .NET and Visual Studio Remote Code Execution Vulnerability\n\n * CVE-2022-26788: PowerShell Elevation of Privilege Vulnerability\n\n * CVE-2022-34716: .NET Spoofing Vulnerability",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-08-05"
},
"Updated": {
"Date": "2023-08-05"
},
"BDUs": [
{
"ID": "BDU:2021-01775",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2021-01775",
"Impact": "Low",
"Public": "20200810"
},
{
"ID": "BDU:2022-03282",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2022-03282",
"Impact": "High",
"Public": "20220412"
},
{
"ID": "BDU:2022-05512",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2022-05512",
"Impact": "High",
"Public": "20220510"
},
{
"ID": "BDU:2022-05516",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-05516",
"Impact": "Low",
"Public": "20220510"
}
],
"CVEs": [
{
"ID": "CVE-2020-8927",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8927",
"Impact": "Low",
"Public": "20200915"
},
{
"ID": "CVE-2022-23267",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-23267",
"Impact": "Low",
"Public": "20220510"
},
{
"ID": "CVE-2022-24512",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-24512",
"Impact": "Low",
"Public": "20220309"
},
{
"ID": "CVE-2022-26788",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26788",
"Impact": "Low",
"Public": "20220415"
},
{
"ID": "CVE-2022-34716",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-34716",
"Impact": "None",
"Public": "20220809"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20234713001",
"Comment": "powershell is earlier than 0:7.3.6-alt1"
}
]
}
]
}
}
]
}