vuln-list-alt/oval/p10/ALT-PU-2019-1249/definitions.json
2024-06-28 13:17:52 +00:00

309 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191249",
"Version": "oval:org.altlinux.errata:def:20191249",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1249: package `elfutils` update to version 0.176-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1249",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1249",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01235",
"RefURL": "https://bdu.fstec.ru/vul/2019-01235",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01236",
"RefURL": "https://bdu.fstec.ru/vul/2019-01236",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01237",
"RefURL": "https://bdu.fstec.ru/vul/2019-01237",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01238",
"RefURL": "https://bdu.fstec.ru/vul/2019-01238",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01239",
"RefURL": "https://bdu.fstec.ru/vul/2019-01239",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01240",
"RefURL": "https://bdu.fstec.ru/vul/2019-01240",
"Source": "BDU"
},
{
"RefID": "CVE-2019-7146",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7146",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7148",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7148",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7149",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7149",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7150",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7150",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7664",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7664",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7665",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7665",
"Source": "CVE"
}
],
"Description": "This update upgrades elfutils to version 0.176-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01235: Уязвимость функции ebl_object_note() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01236: Уязвимость функции read_long_names() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01237: Уязвимость функции read_srclines в пакете elfutils, связанная с чтением за границей буфера, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01238: Уязвимость функции elf64_xlatetom в пакете elfutils, связанная с отсутствием проверки соответствия ожидаемого размера данных и реально прочитанных из файла дампа (core), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01239: Уязвимость функции elf_cvt_note() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01240: Уязвимость функции elf32_xlatetom в пакете elfutils, связанная с возможностью выхода операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-7146: In elfutils 0.175, there is a buffer over-read in the ebl_object_note function in eblobjnote.c in libebl. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted elf file, as demonstrated by eu-readelf.\n\n * CVE-2019-7148: An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a \"warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens.\"\n\n * CVE-2019-7149: A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.\n\n * CVE-2019-7150: An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.\n\n * CVE-2019-7664: In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).\n\n * CVE-2019-7665: In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-02-15"
},
"Updated": {
"Date": "2019-02-15"
},
"BDUs": [
{
"ID": "BDU:2019-01235",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-01235",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "BDU:2019-01236",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-400, CWE-770",
"Href": "https://bdu.fstec.ru/vul/2019-01236",
"Impact": "Low",
"Public": "20190111"
},
{
"ID": "BDU:2019-01237",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-01237",
"Impact": "Low",
"Public": "20190312"
},
{
"ID": "BDU:2019-01238",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-01238",
"Impact": "Low",
"Public": "20190312"
},
{
"ID": "BDU:2019-01239",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-01239",
"Impact": "Low",
"Public": "20190312"
},
{
"ID": "BDU:2019-01240",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-01240",
"Impact": "Low",
"Public": "20190312"
}
],
"CVEs": [
{
"ID": "CVE-2019-7146",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7146",
"Impact": "Low",
"Public": "20190129"
},
{
"ID": "CVE-2019-7148",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7148",
"Impact": "Low",
"Public": "20190129"
},
{
"ID": "CVE-2019-7149",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7149",
"Impact": "Low",
"Public": "20190129"
},
{
"ID": "CVE-2019-7150",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7150",
"Impact": "Low",
"Public": "20190129"
},
{
"ID": "CVE-2019-7664",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7664",
"Impact": "Low",
"Public": "20190209"
},
{
"ID": "CVE-2019-7665",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7665",
"Impact": "Low",
"Public": "20190209"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191249001",
"Comment": "elfutils is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249002",
"Comment": "elfutils-devel is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249003",
"Comment": "elfutils-devel-static is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249004",
"Comment": "libasm is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249005",
"Comment": "libasm-devel is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249006",
"Comment": "libasm-devel-static is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249007",
"Comment": "libdw is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249008",
"Comment": "libdw-devel is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249009",
"Comment": "libdw-devel-static is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249010",
"Comment": "libelf is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249011",
"Comment": "libelf-devel is earlier than 0:0.176-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191249012",
"Comment": "libelf-devel-static is earlier than 0:0.176-alt1"
}
]
}
]
}
}
]
}