vuln-list-alt/oval/p11/ALT-PU-2017-1869/definitions.json
2024-12-12 21:07:30 +00:00

125 lines
4.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171869",
"Version": "oval:org.altlinux.errata:def:20171869",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1869: package `libgcrypt` update to version 1.7.8-alt1.S1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1869",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1869",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00007",
"RefURL": "https://bdu.fstec.ru/vul/2018-00007",
"Source": "BDU"
},
{
"RefID": "CVE-2017-7526",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7526",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9526",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9526",
"Source": "CVE"
}
],
"Description": "This update upgrades libgcrypt to version 1.7.8-alt1.S1. \nSecurity Fix(es):\n\n * BDU:2018-00007: Уязвимость библиотеки libgcrypt11, связанная с отсутствием защиты служебных данных, позволяющая нарушителю нарушить конфиденциальность данных\n\n * CVE-2017-7526: libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.\n\n * CVE-2017-9526: In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-07-13"
},
"Updated": {
"Date": "2017-07-13"
},
"BDUs": [
{
"ID": "BDU:2018-00007",
"CVSS": "AV:N/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00007",
"Impact": "Low",
"Public": "20170629"
}
],
"CVEs": [
{
"ID": "CVE-2017-7526",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7526",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "CVE-2017-9526",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9526",
"Impact": "Low",
"Public": "20170611"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171869001",
"Comment": "gcrypt-utils is earlier than 0:1.7.8-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171869002",
"Comment": "libgcrypt-devel is earlier than 0:1.7.8-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171869003",
"Comment": "libgcrypt-devel-static is earlier than 0:1.7.8-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171869004",
"Comment": "libgcrypt20 is earlier than 0:1.7.8-alt1.S1"
}
]
}
]
}
}
]
}