pcs-0.9.169-3.el7.3
エラータID: AXSA:2022-4104:06
リリース日:
2022/11/21 Monday - 15:32
題名:
pcs-0.9.169-3.el7.3
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- jQuery には、オブジェクトプロトタイプ汚染の問題があり、
jQuery.extend(true, {}, ...) を正しく扱わない脆弱性が
あります。(CVE-2019-11358)
現時点では下記の CVE の情報が公開されておりません。
CVE の情報が公開され次第情報をアップデートいたします。
CVE-2022-30123
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2019-11358
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2022-30123
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
追加情報:
N/A
ダウンロード:
SRPMS
- pcs-0.9.169-3.el7.3.src.rpm
MD5: 7bf47065f6f2b9f8048b1c27d3bc74db
SHA-256: e61506cda76fe819ab54981f7e2611c8571c5cb553ce113bf214800986131819
Size: 3.59 MB
Asianux Server 7 for x86_64
- pcs-0.9.169-3.el7.3.x86_64.rpm
MD5: f39ca15f47b6ddcb9dcd3aabfdd397cb
SHA-256: 1b2bf21736e1cd678fc1bdd54ffb89a7bda64b8075128bb712efccc42d3d23a4
Size: 4.19 MB - pcs-snmp-0.9.169-3.el7.3.x86_64.rpm
MD5: bfc26a39d93c21d6515c1b69926c6c09
SHA-256: 72824cf9639c76fa4530ce3ff1cbcd936dd35def6933d2a852e056fe61f1604a
Size: 81.38 kB