2024-04-16 14:26:14 +00:00

132 lines
5.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202756",
"Version": "oval:org.altlinux.errata:def:20202756",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2756: package `neomutt` update to version 20200821-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2756",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2756",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-02007",
"RefURL": "https://bdu.fstec.ru/vul/2021-02007",
"Source": "BDU"
},
{
"RefID": "CVE-2020-14954",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14954",
"Source": "CVE"
}
],
"Description": "This update upgrades neomutt to version 20200821-alt2. \nSecurity Fix(es):\n\n * BDU:2021-02007: Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с недостатками процедуры нейтрализации особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * CVE-2020-14954: Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a \"begin TLS\" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka \"response injection.\"\n\n * #38891: Ошибка сегментирования при отправке письма на алиас без адреса",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-09-10"
},
"Updated": {
"Date": "2020-09-10"
},
"BDUs": [
{
"ID": "BDU:2021-02007",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-74",
"Href": "https://bdu.fstec.ru/vul/2021-02007",
"Impact": "Low",
"Public": "20200619"
}
],
"CVEs": [
{
"ID": "CVE-2020-14954",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-74",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14954",
"Impact": "Low",
"Public": "20200621"
}
],
"Bugzilla": [
{
"ID": "38891",
"Href": "https://bugzilla.altlinux.org/38891",
"Data": "Ошибка сегментирования при отправке письма на алиас без адреса"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202756001",
"Comment": "neomutt is earlier than 0:20200821-alt2"
}
]
}
]
}
}
]
}