267 lines
12 KiB
JSON
267 lines
12 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20162068",
|
||
"Version": "oval:org.altlinux.errata:def:20162068",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2016-2068: package `node` update to version 6.7.0-alt6",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2016-2068",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-2068",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01911",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01911",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01912",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01912",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03140",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03140",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02461",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02461",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02558",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02558",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2178",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-2183",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5325",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5325",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6303",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6303",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6304",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-6306",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7052",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7052",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-7099",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-7099",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades node to version 6.7.0-alt6. \nSecurity Fix(es):\n\n * BDU:2019-01911: Уязвимость в файле t1_lib.c библиотеки OpenSSL, позволяющие нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01912: Уязвимость функции MDC2_Update библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03140: Уязвимость алгоритмов шифрования DES и Triple DES, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-02461: Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-02558: Уязвимость функции dsa_sign_setup библиотеки OpenSSL , связанная с раскрытием защищаемой информации, позволяющая нарушителю обойти криптографические механизмы защиты шифрования\n\n * CVE-2016-2178: The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.\n\n * CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.\n\n * CVE-2016-5325: CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.\n\n * CVE-2016-6303: Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2016-6304: Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.\n\n * CVE-2016-6306: The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.\n\n * CVE-2016-7052: crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.\n\n * CVE-2016-7099: The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2016-10-05"
|
||
},
|
||
"Updated": {
|
||
"Date": "2016-10-05"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-01911",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01911",
|
||
"Impact": "High",
|
||
"Public": "20160829"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01912",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01912",
|
||
"Impact": "Critical",
|
||
"Public": "20160811"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03140",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03140",
|
||
"Impact": "High",
|
||
"Public": "20160831"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02461",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02461",
|
||
"Impact": "Low",
|
||
"Public": "20160926"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02558",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02558",
|
||
"Impact": "Low",
|
||
"Public": "20160620"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2016-2178",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178",
|
||
"Impact": "Low",
|
||
"Public": "20160620"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-2183",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
|
||
"Impact": "High",
|
||
"Public": "20160901"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5325",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-113",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5325",
|
||
"Impact": "Low",
|
||
"Public": "20161010"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6303",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6303",
|
||
"Impact": "Critical",
|
||
"Public": "20160916"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6304",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-401",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304",
|
||
"Impact": "High",
|
||
"Public": "20160926"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-6306",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306",
|
||
"Impact": "Low",
|
||
"Public": "20160926"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7052",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7052",
|
||
"Impact": "High",
|
||
"Public": "20160926"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-7099",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-7099",
|
||
"Impact": "Low",
|
||
"Public": "20161010"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162068001",
|
||
"Comment": "node is earlier than 0:6.7.0-alt6"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162068002",
|
||
"Comment": "node-devel is earlier than 0:6.7.0-alt6"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162068003",
|
||
"Comment": "node-doc is earlier than 0:6.7.0-alt6"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162068004",
|
||
"Comment": "npm is earlier than 0:3.10.3-alt6"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |