511 lines
26 KiB
JSON
511 lines
26 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20182598",
|
||
"Version": "oval:org.altlinux.errata:def:20182598",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-2598: package `openssh` update to version 7.9p1-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-2598",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2598",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00350",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00350",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00351",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00351",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00352",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00352",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00353",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00353",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-02607",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-02607",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01037",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01037",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01500",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01500",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00773",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00773",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00830",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00830",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00831",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00831",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00832",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00832",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01833",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01833",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03788",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03788",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03791",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03791",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03293",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03293",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03294",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03294",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10009",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10009",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10010",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10010",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10011",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10011",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10012",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10012",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-10708",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-10708",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2017-15906",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15906",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-15473",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15473",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-15919",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-15919",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-20685",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-6109",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6109",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-6110",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6110",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-6111",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-6111",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades openssh to version 7.9p1-alt1. \nSecurity Fix(es):\n\n * BDU:2017-00350: Уязвимость менеджера разделяемой памяти демона sshd средства криптографической защиты OpenSSH, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2017-00351: Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00352: Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2017-00353: Уязвимость агента ssh-agent средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-02607: Уязвимость функции process_open средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-01037: Уязвимость средства криптографической защиты OpenSSH, связанная с различной реакцией сервера на запросы аутентификации, позволяющая нарушителю выявить существующие учетные записи пользователей\n\n * BDU:2018-01500: Уязвимость функций сервера sshd средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00773: Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу\n\n * BDU:2019-00830: Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю манипулировать файлами в каталоге клиента\n\n * BDU:2019-00831: Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостатками контроля доступа, позволяющая нарушителю скрывать имя передаваемого файла\n\n * BDU:2019-00832: Уязвимость реализаций утилиты для удаленного копирования файлов scp, связанная с недостатками контроля доступа, позволяющая нарушителю скрывать имя передаваемого файла\n\n * BDU:2019-01833: Уязвимость средства криптографической защиты OpenSSH, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-03788: Уязвимость средства криптографической защиты OpenSSH, вызваная ошибками при проверке имени каталога scp.c в клиенте scp, позволяющая нарушителю изменить права доступа к целевому каталогу\n\n * BDU:2019-03791: Уязвимость функции refresh_progress_meter() (progressmeter.c) средства криптографической защиты OpenSSH, позволяющая нарушителю раскрыть защищаемую информацию или выполнить произвольный код\n\n * BDU:2021-03293: Уязвимость компонента authfile.c службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-03294: Уязвимость службы sshd средства криптографической защиты OpenSSH, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2016-10009: Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.\n\n * CVE-2016-10010: sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.\n\n * CVE-2016-10011: authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.\n\n * CVE-2016-10012: The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.\n\n * CVE-2016-10708: sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.\n\n * CVE-2017-15906: The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.\n\n * CVE-2018-15473: OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.\n\n * CVE-2018-15919: Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or \"oracle\") as a vulnerability.'\n\n * CVE-2018-20685: In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.\n\n * CVE-2019-6109: An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.\n\n * CVE-2019-6110: In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.\n\n * CVE-2019-6111: An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-11-06"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-11-06"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2017-00350",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00350",
|
||
"Impact": "High",
|
||
"Public": "20170105"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00351",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CWE": "CWE-320",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00351",
|
||
"Impact": "Low",
|
||
"Public": "20170105"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00352",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00352",
|
||
"Impact": "Low",
|
||
"Public": "20170105"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00353",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-426",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00353",
|
||
"Impact": "High",
|
||
"Public": "20161124"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-02607",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-275",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-02607",
|
||
"Impact": "Low",
|
||
"Public": "20170404"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01037",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01037",
|
||
"Impact": "High",
|
||
"Public": "20180817"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01500",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01500",
|
||
"Impact": "High",
|
||
"Public": "20180121"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00773",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00773",
|
||
"Impact": "Low",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00830",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00830",
|
||
"Impact": "Low",
|
||
"Public": "20190115"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00831",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00831",
|
||
"Impact": "Low",
|
||
"Public": "20190115"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00832",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00832",
|
||
"Impact": "Low",
|
||
"Public": "20190115"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01833",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01833",
|
||
"Impact": "Low",
|
||
"Public": "20180828"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03788",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03788",
|
||
"Impact": "Low",
|
||
"Public": "20190114"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03791",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03791",
|
||
"Impact": "Low",
|
||
"Public": "20190114"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03293",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-320",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03293",
|
||
"Impact": "Low",
|
||
"Public": "20170104"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03294",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03294",
|
||
"Impact": "High",
|
||
"Public": "20150811"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2016-10009",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-426",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10009",
|
||
"Impact": "High",
|
||
"Public": "20170105"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10010",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10010",
|
||
"Impact": "High",
|
||
"Public": "20170105"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10011",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-320",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10011",
|
||
"Impact": "Low",
|
||
"Public": "20170105"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10012",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10012",
|
||
"Impact": "High",
|
||
"Public": "20170105"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-10708",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-10708",
|
||
"Impact": "High",
|
||
"Public": "20180121"
|
||
},
|
||
{
|
||
"ID": "CVE-2017-15906",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15906",
|
||
"Impact": "Low",
|
||
"Public": "20171026"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-15473",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15473",
|
||
"Impact": "Low",
|
||
"Public": "20180817"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-15919",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-15919",
|
||
"Impact": "Low",
|
||
"Public": "20180828"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-20685",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20685",
|
||
"Impact": "Low",
|
||
"Public": "20190110"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-6109",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-116",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6109",
|
||
"Impact": "Low",
|
||
"Public": "20190131"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-6110",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||
"CWE": "CWE-838",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6110",
|
||
"Impact": "Low",
|
||
"Public": "20190131"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-6111",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-22",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-6111",
|
||
"Impact": "Low",
|
||
"Public": "20190131"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182598001",
|
||
"Comment": "openssh is earlier than 0:7.9p1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182598002",
|
||
"Comment": "openssh-askpass-common is earlier than 0:7.9p1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182598003",
|
||
"Comment": "openssh-clients is earlier than 0:7.9p1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182598004",
|
||
"Comment": "openssh-common is earlier than 0:7.9p1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182598005",
|
||
"Comment": "openssh-keysign is earlier than 0:7.9p1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182598006",
|
||
"Comment": "openssh-server is earlier than 0:7.9p1-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182598007",
|
||
"Comment": "openssh-server-control is earlier than 0:7.9p1-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |