2024-06-28 13:17:52 +00:00

177 lines
7.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182231",
"Version": "oval:org.altlinux.errata:def:20182231",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2231: package `krb5` update to version 1.16.1-alt1.S1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2231",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2231",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01636",
"RefURL": "https://bdu.fstec.ru/vul/2019-01636",
"Source": "BDU"
},
{
"RefID": "CVE-2017-7562",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7562",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5729",
"Source": "CVE"
},
{
"RefID": "CVE-2018-5730",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5730",
"Source": "CVE"
}
],
"Description": "This update upgrades krb5 to version 1.16.1-alt1.S1. \nSecurity Fix(es):\n\n * BDU:2019-01636: Уязвимость сетевого протокола аутентификации Kerberos, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-7562: An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.\n\n * CVE-2018-5729: MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.\n\n * CVE-2018-5730: MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a \"linkdn\" and \"containerdn\" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-08-27"
},
"Updated": {
"Date": "2018-08-27"
},
"BDUs": [
{
"ID": "BDU:2019-01636",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-01636",
"Impact": "Low",
"Public": "20180103"
}
],
"CVEs": [
{
"ID": "CVE-2017-7562",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7562",
"Impact": "Low",
"Public": "20180726"
},
{
"ID": "CVE-2018-5729",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5729",
"Impact": "Low",
"Public": "20180306"
},
{
"ID": "CVE-2018-5730",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-90",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5730",
"Impact": "Low",
"Public": "20180306"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182231001",
"Comment": "krb5-doc is earlier than 0:1.16.1-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182231002",
"Comment": "krb5-kadmin is earlier than 0:1.16.1-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182231003",
"Comment": "krb5-kdc is earlier than 0:1.16.1-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182231004",
"Comment": "krb5-kinit is earlier than 0:1.16.1-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182231005",
"Comment": "libkrb5 is earlier than 0:1.16.1-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182231006",
"Comment": "libkrb5-devel is earlier than 0:1.16.1-alt1.S1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182231007",
"Comment": "libkrb5-ldap is earlier than 0:1.16.1-alt1.S1"
}
]
}
]
}
}
]
}