2024-06-28 13:17:52 +00:00

127 lines
4.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161623",
"Version": "oval:org.altlinux.errata:def:20161623",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1623: package `node` update to version 4.4.5-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1623",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1623",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-02960",
"RefURL": "https://bdu.fstec.ru/vul/2020-02960",
"Source": "BDU"
},
{
"RefID": "CVE-2016-2105",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2107",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107",
"Source": "CVE"
}
],
"Description": "This update upgrades node to version 4.4.5-alt1. \nSecurity Fix(es):\n\n * BDU:2020-02960: Уязвимость функции EVP_EncodeUpdate (crypto/evp/encode.c) библиотеки OpenSSL, связанная с ошибкой при обработке числа, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2016-2105: Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.\n\n * CVE-2016-2107: The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-06-16"
},
"Updated": {
"Date": "2016-06-16"
},
"BDUs": [
{
"ID": "BDU:2020-02960",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2020-02960",
"Impact": "High",
"Public": "20160504"
}
],
"CVEs": [
{
"ID": "CVE-2016-2105",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2105",
"Impact": "High",
"Public": "20160505"
},
{
"ID": "CVE-2016-2107",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2107",
"Impact": "Low",
"Public": "20160505"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161623001",
"Comment": "node is earlier than 0:4.4.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161623002",
"Comment": "node-devel is earlier than 0:4.4.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161623003",
"Comment": "node-doc is earlier than 0:4.4.5-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161623004",
"Comment": "npm is earlier than 0:2.15.5-alt1"
}
]
}
]
}
}
]
}