2024-07-23 15:04:31 +00:00

115 lines
4.0 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20141852",
"Version": "oval:org.altlinux.errata:def:20141852",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2014-1852: package `gnupg` update to version 1.4.17-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2014-1852",
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-1852",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-02001",
"RefURL": "https://bdu.fstec.ru/vul/2015-02001",
"Source": "BDU"
},
{
"RefID": "BDU:2015-02002",
"RefURL": "https://bdu.fstec.ru/vul/2015-02002",
"Source": "BDU"
},
{
"RefID": "CVE-2014-4617",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4617",
"Source": "CVE"
}
],
"Description": "This update upgrades gnupg to version 1.4.17-alt1. \nSecurity Fix(es):\n\n * BDU:2015-02001: Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-02002: Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * CVE-2014-4617: The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2014-06-28"
},
"Updated": {
"Date": "2014-06-28"
},
"BDUs": [
{
"ID": "BDU:2015-02001",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2015-02001",
"Impact": "Low",
"Public": "20140625"
},
{
"ID": "BDU:2015-02002",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2015-02002",
"Impact": "Low"
}
],
"CVEs": [
{
"ID": "CVE-2014-4617",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4617",
"Impact": "Low",
"Public": "20140625"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20141852001",
"Comment": "gnupg is earlier than 0:1.4.17-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20141852002",
"Comment": "gnupg-ldap is earlier than 0:1.4.17-alt1"
}
]
}
]
}
}
]
}