2024-12-12 21:07:30 +00:00

417 lines
21 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20151023",
"Version": "oval:org.altlinux.errata:def:20151023",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-1023: package `openssl10` update to version 1.0.1k-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-1023",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1023",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-06127",
"RefURL": "https://bdu.fstec.ru/vul/2015-06127",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06128",
"RefURL": "https://bdu.fstec.ru/vul/2015-06128",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06129",
"RefURL": "https://bdu.fstec.ru/vul/2015-06129",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06130",
"RefURL": "https://bdu.fstec.ru/vul/2015-06130",
"Source": "BDU"
},
{
"RefID": "BDU:2015-06131",
"RefURL": "https://bdu.fstec.ru/vul/2015-06131",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09142",
"RefURL": "https://bdu.fstec.ru/vul/2015-09142",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09143",
"RefURL": "https://bdu.fstec.ru/vul/2015-09143",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09144",
"RefURL": "https://bdu.fstec.ru/vul/2015-09144",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09145",
"RefURL": "https://bdu.fstec.ru/vul/2015-09145",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09146",
"RefURL": "https://bdu.fstec.ru/vul/2015-09146",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09819",
"RefURL": "https://bdu.fstec.ru/vul/2015-09819",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09905",
"RefURL": "https://bdu.fstec.ru/vul/2015-09905",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09960",
"RefURL": "https://bdu.fstec.ru/vul/2015-09960",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09963",
"RefURL": "https://bdu.fstec.ru/vul/2015-09963",
"Source": "BDU"
},
{
"RefID": "BDU:2015-09980",
"RefURL": "https://bdu.fstec.ru/vul/2015-09980",
"Source": "BDU"
},
{
"RefID": "CVE-2014-3569",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3569",
"Source": "CVE"
},
{
"RefID": "CVE-2014-3570",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3570",
"Source": "CVE"
},
{
"RefID": "CVE-2014-3571",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3571",
"Source": "CVE"
},
{
"RefID": "CVE-2014-3572",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3572",
"Source": "CVE"
},
{
"RefID": "CVE-2014-8275",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8275",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0204",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0204",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0205",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0205",
"Source": "CVE"
},
{
"RefID": "CVE-2015-0206",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0206",
"Source": "CVE"
}
],
"Description": "This update upgrades openssl10 to version 1.0.1k-alt1. \nSecurity Fix(es):\n\n * BDU:2015-06127: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-06128: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-06129: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-06130: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-06131: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-09142: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09143: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09144: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09145: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09146: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-09819: Уязвимости операционной системы Альт Линукс СПТ, позволяющие удаленному злоумышленнику нарушить целостность и доступность передаваемой защищаемой информации\n\n * BDU:2015-09905: Уязвимости системы автоматизации деятельности предприятия 1С:Предприятие, позволяющие злоумышленнику вызвать отказ в обслуживании или получить доступ к зашифрованным данным без знания ключа шифрования\n\n * BDU:2015-09960: Уязвимость программной платформы Java Platform, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения\n\n * BDU:2015-09963: Уязвимость программной платформы JRockit, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения\n\n * BDU:2015-09980: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * CVE-2014-3569: The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.\n\n * CVE-2014-3570: The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.\n\n * CVE-2014-3571: OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.\n\n * CVE-2014-3572: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.\n\n * CVE-2014-8275: OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.\n\n * CVE-2015-0204: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the \"FREAK\" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.\n\n * CVE-2015-0205: The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.\n\n * CVE-2015-0206: Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.\n\n * #30644: Multiple vulnerabilities (include 2015 year CVEs)",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-01-12"
},
"Updated": {
"Date": "2015-01-12"
},
"BDUs": [
{
"ID": "BDU:2015-06127",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06127",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-06128",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06128",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-06129",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06129",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-06130",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06130",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-06131",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-06131",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09142",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-09142",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09143",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-09143",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09144",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-09144",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09145",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-09145",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09146",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-09146",
"Impact": "High",
"Public": "20150120"
},
{
"ID": "BDU:2015-09819",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2015-09819",
"Impact": "Low",
"Public": "20150330"
},
{
"ID": "BDU:2015-09905",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-09905",
"Impact": "High",
"Public": "20131201"
},
{
"ID": "BDU:2015-09960",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09960",
"Impact": "Low",
"Public": "20150416"
},
{
"ID": "BDU:2015-09963",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-09963",
"Impact": "Low",
"Public": "20150416"
},
{
"ID": "BDU:2015-09980",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2015-09980",
"Impact": "Low",
"Public": "20150416"
}
],
"CVEs": [
{
"ID": "CVE-2014-3569",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3569",
"Impact": "Low",
"Public": "20141224"
},
{
"ID": "CVE-2014-3570",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3570",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2014-3571",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3571",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2014-3572",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3572",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2014-8275",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8275",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2015-0204",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0204",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2015-0205",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0205",
"Impact": "Low",
"Public": "20150109"
},
{
"ID": "CVE-2015-0206",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0206",
"Impact": "Low",
"Public": "20150109"
}
],
"Bugzilla": [
{
"ID": "30644",
"Href": "https://bugzilla.altlinux.org/30644",
"Data": "Multiple vulnerabilities (include 2015 year CVEs)"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20151023001",
"Comment": "libcrypto10 is earlier than 0:1.0.1k-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151023002",
"Comment": "libssl-devel is earlier than 0:1.0.1k-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151023003",
"Comment": "libssl-devel-static is earlier than 0:1.0.1k-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151023004",
"Comment": "libssl10 is earlier than 0:1.0.1k-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151023005",
"Comment": "openssl is earlier than 0:1.0.1k-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151023006",
"Comment": "openssl-doc is earlier than 0:1.0.1k-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151023007",
"Comment": "openssl-engines is earlier than 0:1.0.1k-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151023008",
"Comment": "tsget is earlier than 0:1.0.1k-alt1"
}
]
}
]
}
}
]
}