2024-01-10 07:45:25 +00:00

153 lines
6.0 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222120",
"Version": "oval:org.altlinux.errata:def:20222120",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2120: package `php7-curl` update to version 7.4.30-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2120",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2120",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-03725",
"RefURL": "https://bdu.fstec.ru/vul/2022-03725",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05351",
"RefURL": "https://bdu.fstec.ru/vul/2022-05351",
"Source": "BDU"
},
{
"RefID": "CVE-2022-31625",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31625",
"Source": "CVE"
},
{
"RefID": "CVE-2022-31626",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31626",
"Source": "CVE"
}
],
"Description": "This update upgrades php7-curl to version 7.4.30-alt1. \nSecurity Fix(es):\n\n * BDU:2022-03725: Уязвимость функции mysqlnd/pdo (mysqlnd_wireprotocol.c) интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05351: Уязвимость функции pg_query_params() интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2022-31625: In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.\n\n * CVE-2022-31626: In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2023 BaseALT Ltd.",
"Issued": {
"Date": "2022-06-22"
},
"Updated": {
"Date": "2022-06-22"
},
"bdu": [
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-03725",
"Impact": "High",
"Public": "20220516",
"CveID": "BDU:2022-03725"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"Cvss3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05351",
"Impact": "Critical",
"Public": "20220227",
"CveID": "BDU:2022-05351"
}
],
"Cves": [
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-763",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31625",
"Impact": "High",
"Public": "20220616",
"CveID": "CVE-2022-31625"
},
{
"Cvss": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"Cwe": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31626",
"Impact": "High",
"Public": "20220616",
"CveID": "CVE-2022-31626"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222120001",
"Comment": "php7-curl is earlier than 0:7.4.30-alt1"
}
]
}
]
}
}
]
}