2024-06-28 13:17:52 +00:00

105 lines
3.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20172769",
"Version": "oval:org.altlinux.errata:def:20172769",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-2769: package `gnupg` update to version 1.4.22-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-2769",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2769",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00007",
"RefURL": "https://bdu.fstec.ru/vul/2018-00007",
"Source": "BDU"
},
{
"RefID": "CVE-2017-7526",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7526",
"Source": "CVE"
}
],
"Description": "This update upgrades gnupg to version 1.4.22-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00007: Уязвимость библиотеки libgcrypt11, связанная с отсутствием защиты служебных данных, позволяющая нарушителю нарушить конфиденциальность данных\n\n * CVE-2017-7526: libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-12-08"
},
"Updated": {
"Date": "2017-12-08"
},
"BDUs": [
{
"ID": "BDU:2018-00007",
"CVSS": "AV:N/AC:H/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2018-00007",
"Impact": "Low",
"Public": "20170629"
}
],
"CVEs": [
{
"ID": "CVE-2017-7526",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7526",
"Impact": "Low",
"Public": "20180726"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20172769001",
"Comment": "gnupg is earlier than 0:1.4.22-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172769002",
"Comment": "gnupg-ldap is earlier than 0:1.4.22-alt1"
}
]
}
]
}
}
]
}