vuln-list-alt/oval/c9f2/ALT-PU-2016-1438/definitions.json
2024-06-28 13:17:52 +00:00

261 lines
12 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161438",
"Version": "oval:org.altlinux.errata:def:20161438",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1438: package `openssl10` update to version 1.0.2h-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1438",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1438",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-02960",
"RefURL": "https://bdu.fstec.ru/vul/2020-02960",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02961",
"RefURL": "https://bdu.fstec.ru/vul/2020-02961",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02962",
"RefURL": "https://bdu.fstec.ru/vul/2020-02962",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02963",
"RefURL": "https://bdu.fstec.ru/vul/2020-02963",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02964",
"RefURL": "https://bdu.fstec.ru/vul/2020-02964",
"Source": "BDU"
},
{
"RefID": "CVE-2016-2105",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2106",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2107",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2109",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2176",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2176",
"Source": "CVE"
}
],
"Description": "This update upgrades openssl10 to version 1.0.2h-alt1. \nSecurity Fix(es):\n\n * BDU:2020-02960: Уязвимость функции EVP_EncodeUpdate (crypto/evp/encode.c) библиотеки OpenSSL, связанная с ошибкой при обработке числа, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02961: Уязвимость функции EVP_EncodeUpdate (crypto/evp/evp_enc.c) библиотеки OpenSSL, связанная с ошибкой при обработке числа, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02962: Уязвимость функции проверки заполнения реализации AES-NI библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-02963: Уязвимость функции asn1_d2i_read_bio (crypto/asn1/a_d2i_fp.c) библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02964: Уязвимость функции X509_NAME_oneline (crypto/x509/x509_obj.c) библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным или вызвать отказ в обслуживании\n\n * CVE-2016-2105: Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.\n\n * CVE-2016-2106: Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.\n\n * CVE-2016-2107: The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.\n\n * CVE-2016-2109: The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.\n\n * CVE-2016-2176: The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-05-04"
},
"Updated": {
"Date": "2016-05-04"
},
"BDUs": [
{
"ID": "BDU:2020-02960",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2020-02960",
"Impact": "High",
"Public": "20160504"
},
{
"ID": "BDU:2020-02961",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2020-02961",
"Impact": "High",
"Public": "20160504"
},
{
"ID": "BDU:2020-02962",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-02962",
"Impact": "Low",
"Public": "20160504"
},
{
"ID": "BDU:2020-02963",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-02963",
"Impact": "High",
"Public": "20160504"
},
{
"ID": "BDU:2020-02964",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-02964",
"Impact": "High",
"Public": "20160504"
}
],
"CVEs": [
{
"ID": "CVE-2016-2105",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105",
"Impact": "High",
"Public": "20160505"
},
{
"ID": "CVE-2016-2106",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2106",
"Impact": "High",
"Public": "20160505"
},
{
"ID": "CVE-2016-2107",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107",
"Impact": "Low",
"Public": "20160505"
},
{
"ID": "CVE-2016-2109",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-399",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2109",
"Impact": "High",
"Public": "20160505"
},
{
"ID": "CVE-2016-2176",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2176",
"Impact": "High",
"Public": "20160505"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161438001",
"Comment": "i586-libcrypto10 is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438002",
"Comment": "i586-libssl-devel is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438003",
"Comment": "i586-libssl-devel-static is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438004",
"Comment": "i586-libssl10 is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438005",
"Comment": "i586-openssl-engines is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438006",
"Comment": "libcrypto10 is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438007",
"Comment": "libssl-devel is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438008",
"Comment": "libssl-devel-static is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438009",
"Comment": "libssl10 is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438010",
"Comment": "openssl is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438011",
"Comment": "openssl-doc is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438012",
"Comment": "openssl-engines is earlier than 0:1.0.2h-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161438013",
"Comment": "tsget is earlier than 0:1.0.2h-alt1"
}
]
}
]
}
}
]
}