vuln-list-alt/oval/p9/ALT-PU-2020-1224/definitions.json
2024-04-16 14:26:14 +00:00

199 lines
8.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20201224",
"Version": "oval:org.altlinux.errata:def:20201224",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-1224: package `gnutls30` update to version 3.6.12-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-1224",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1224",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-01598",
"RefURL": "https://bdu.fstec.ru/vul/2020-01598",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01599",
"RefURL": "https://bdu.fstec.ru/vul/2020-01599",
"Source": "BDU"
},
{
"RefID": "CVE-2018-10844",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10844",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10845",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10845",
"Source": "CVE"
},
{
"RefID": "CVE-2018-10846",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10846",
"Source": "CVE"
}
],
"Description": "This update upgrades gnutls30 to version 3.6.12-alt1. \nSecurity Fix(es):\n\n * BDU:2020-01598: Уязвимость реализации механизма HMAC-SHA-256 криптографической библиотеки GnuTLS, позволяющая нарушителю осуществить атаку типа «Lucky 13» и атаку с восстановлением открытого текста\n\n * BDU:2020-01599: Уязвимость реализации механизма HMAC-SHA-384 криптографической библиотеки GnuTLS, позволяющая нарушителю осуществить атаку типа «Lucky 13» и атаку с восстановлением открытого текста\n\n * CVE-2018-10844: It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.\n\n * CVE-2018-10845: It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.\n\n * CVE-2018-10846: A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of \"Just in Time\" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-02-14"
},
"Updated": {
"Date": "2020-02-14"
},
"BDUs": [
{
"ID": "BDU:2020-01598",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-327, CWE-385",
"Href": "https://bdu.fstec.ru/vul/2020-01598",
"Impact": "Low",
"Public": "20180811"
},
{
"ID": "BDU:2020-01599",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-327, CWE-385",
"Href": "https://bdu.fstec.ru/vul/2020-01599",
"Impact": "Low",
"Public": "20180811"
}
],
"CVEs": [
{
"ID": "CVE-2018-10844",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-385",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10844",
"Impact": "Low",
"Public": "20180822"
},
{
"ID": "CVE-2018-10845",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-385",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10845",
"Impact": "Low",
"Public": "20180822"
},
{
"ID": "CVE-2018-10846",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-385",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10846",
"Impact": "Low",
"Public": "20180822"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20201224001",
"Comment": "gnutls-utils is earlier than 0:3.6.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201224002",
"Comment": "gnutls30-devel-doc is earlier than 0:3.6.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201224003",
"Comment": "libgnutls-devel is earlier than 0:3.6.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201224004",
"Comment": "libgnutls-guile is earlier than 0:3.6.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201224005",
"Comment": "libgnutls-openssl-devel is earlier than 0:3.6.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201224006",
"Comment": "libgnutls27-openssl is earlier than 0:3.6.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201224007",
"Comment": "libgnutls30 is earlier than 0:3.6.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201224008",
"Comment": "libgnutlsxx-devel is earlier than 0:3.6.12-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201224009",
"Comment": "libgnutlsxx28 is earlier than 0:3.6.12-alt1"
}
]
}
]
}
}
]
}