2024-06-28 13:17:52 +00:00

129 lines
4.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20194165",
"Version": "oval:org.altlinux.errata:def:20194165",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-4165: package `supervisor` update to version 4.1.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-4165",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-4165",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-01676",
"RefURL": "https://bdu.fstec.ru/vul/2023-01676",
"Source": "BDU"
},
{
"RefID": "CVE-2019-12105",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12105",
"Source": "CVE"
}
],
"Description": "This update upgrades supervisor to version 4.1.0-alt1. \nSecurity Fix(es):\n\n * BDU:2023-01676: Уязвимость компонента inet_http_server системы контроля процессов Supervisor, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * CVE-2019-12105: In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ability to run an open server will not be removed but an additional warning was added to the documentation",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-04-08"
},
"Updated": {
"Date": "2024-04-08"
},
"BDUs": [
{
"ID": "BDU:2023-01676",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-306",
"Href": "https://bdu.fstec.ru/vul/2023-01676",
"Impact": "High",
"Public": "20190529"
}
],
"CVEs": [
{
"ID": "CVE-2019-12105",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-306",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12105",
"Impact": "High",
"Public": "20190910"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20194165001",
"Comment": "python3-module-supervisor is earlier than 0:4.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20194165002",
"Comment": "supervisor is earlier than 0:4.1.0-alt1"
}
]
}
]
}
}
]
}