389 lines
19 KiB
JSON
389 lines
19 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20182673",
|
||
"Version": "oval:org.altlinux.errata:def:20182673",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-2673: package `libwebp` update to version 1.0.1-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-2673",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2673",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03097",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03097",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03098",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03098",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03099",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03099",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03100",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03100",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03101",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03101",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03102",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03102",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03103",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03103",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03104",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03104",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03105",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03105",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03106",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03106",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03107",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03107",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-25009",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25009",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-25010",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25010",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-25011",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25011",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-25012",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25012",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-25013",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25013",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-25014",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-25014",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36328",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36328",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36329",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36329",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36330",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36330",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36331",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36331",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-36332",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-36332",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades libwebp to version 1.0.1-alt1. \nSecurity Fix(es):\n\n * BDU:2021-03097: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-03098: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-03099: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с переполнением буфера в «куче», позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-03100: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с переполнением буфера в «куче», позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-03101: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-03102: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-03103: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-03104: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-03105: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2021-03106: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с использованием неинициализированной переменной, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-03107: Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-25009: A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE16().\n\n * CVE-2018-25010: A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ApplyFilter().\n\n * CVE-2018-25011: A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().\n\n * CVE-2018-25012: A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24().\n\n * CVE-2018-25013: A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes().\n\n * CVE-2018-25014: A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().\n\n * CVE-2020-36328: A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2020-36329: A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\n * CVE-2020-36330: A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the service availability.\n\n * CVE-2020-36331: A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.\n\n * CVE-2020-36332: A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-11-22"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-11-22"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2021-03097",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03097",
|
||
"Impact": "Low",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03098",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03098",
|
||
"Impact": "Low",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03099",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03099",
|
||
"Impact": "High",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03100",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03100",
|
||
"Impact": "High",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03101",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03101",
|
||
"Impact": "High",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03102",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03102",
|
||
"Impact": "Low",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03103",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03103",
|
||
"Impact": "Low",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03104",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03104",
|
||
"Impact": "Low",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03105",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03105",
|
||
"Impact": "Low",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03106",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-457",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03106",
|
||
"Impact": "High",
|
||
"Public": "20210607"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03107",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03107",
|
||
"Impact": "Low",
|
||
"Public": "20210607"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-25009",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25009",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-25010",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25010",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-25011",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25011",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-25012",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25012",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-25013",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25013",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-25014",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-25014",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36328",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36328",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36329",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36329",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36330",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36330",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36331",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36331",
|
||
"Impact": "Critical",
|
||
"Public": "20210521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-36332",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-36332",
|
||
"Impact": "High",
|
||
"Public": "20210521"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182673001",
|
||
"Comment": "libwebp-devel is earlier than 0:1.0.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182673002",
|
||
"Comment": "libwebp-tools is earlier than 0:1.0.1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182673003",
|
||
"Comment": "libwebp7 is earlier than 0:1.0.1-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |