{
  "Definition": [
    {
      "ID": "oval:org.altlinux.errata:def:20172769",
      "Version": "oval:org.altlinux.errata:def:20172769",
      "Class": "patch",
      "Metadata": {
        "Title": "ALT-PU-2017-2769: package `gnupg` update to version 1.4.22-alt1",
        "AffectedList": [
          {
            "Family": "unix",
            "Platforms": [
              "ALT Linux branch c9f2"
            ],
            "Products": [
              "ALT SPWorkstation",
              "ALT SPServer"
            ]
          }
        ],
        "References": [
          {
            "RefID": "ALT-PU-2017-2769",
            "RefURL": "https://errata.altlinux.org/ALT-PU-2017-2769",
            "Source": "ALTPU"
          },
          {
            "RefID": "BDU:2018-00007",
            "RefURL": "https://bdu.fstec.ru/vul/2018-00007",
            "Source": "BDU"
          },
          {
            "RefID": "CVE-2017-7526",
            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7526",
            "Source": "CVE"
          }
        ],
        "Description": "This update upgrades gnupg to version 1.4.22-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00007: Уязвимость библиотеки libgcrypt11, связанная с отсутствием защиты служебных данных, позволяющая нарушителю нарушить конфиденциальность данных\n\n * CVE-2017-7526: libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.",
        "Advisory": {
          "From": "errata.altlinux.org",
          "Severity": "Low",
          "Rights": "Copyright 2024 BaseALT Ltd.",
          "Issued": {
            "Date": "2017-12-08"
          },
          "Updated": {
            "Date": "2017-12-08"
          },
          "BDUs": [
            {
              "ID": "BDU:2018-00007",
              "CVSS": "AV:N/AC:H/Au:S/C:C/I:N/A:N",
              "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
              "CWE": "CWE-200",
              "Href": "https://bdu.fstec.ru/vul/2018-00007",
              "Impact": "Low",
              "Public": "20170629"
            }
          ],
          "CVEs": [
            {
              "ID": "CVE-2017-7526",
              "CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
              "CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
              "CWE": "CWE-310",
              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7526",
              "Impact": "Low",
              "Public": "20180726"
            }
          ],
          "AffectedCPEs": {
            "CPEs": [
              "cpe:/o:alt:spworkstation:8.4",
              "cpe:/o:alt:spserver:8.4"
            ]
          }
        }
      },
      "Criteria": {
        "Operator": "AND",
        "Criterions": [
          {
            "TestRef": "oval:org.altlinux.errata:tst:3001",
            "Comment": "ALT Linux must be installed"
          }
        ],
        "Criterias": [
          {
            "Operator": "OR",
            "Criterions": [
              {
                "TestRef": "oval:org.altlinux.errata:tst:20172769001",
                "Comment": "gnupg is earlier than 0:1.4.22-alt1"
              },
              {
                "TestRef": "oval:org.altlinux.errata:tst:20172769002",
                "Comment": "gnupg-ldap is earlier than 0:1.4.22-alt1"
              }
            ]
          }
        ]
      }
    }
  ]
}