vuln-list-alt/oval/c9f2/ALT-PU-2017-1975/definitions.json
2024-06-28 13:17:52 +00:00

86 lines
2.6 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171975",
"Version": "oval:org.altlinux.errata:def:20171975",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1975: package `chrony` update to version 3.1-alt1.S1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1975",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1975",
"Source": "ALTPU"
},
{
"RefID": "CVE-2016-1567",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1567",
"Source": "CVE"
}
],
"Description": "This update upgrades chrony to version 3.1-alt1.S1. \nSecurity Fix(es):\n\n * CVE-2016-1567: chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-08-04"
},
"Updated": {
"Date": "2017-08-04"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2016-1567",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1567",
"Impact": "High",
"Public": "20160126"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171975001",
"Comment": "chrony is earlier than 0:3.1-alt1.S1"
}
]
}
]
}
}
]
}