2024-06-28 13:17:52 +00:00

137 lines
5.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20192415",
"Version": "oval:org.altlinux.errata:def:20192415",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-2415: package `libtasn1` update to version 4.14-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-2415",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2415",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02509",
"RefURL": "https://bdu.fstec.ru/vul/2019-02509",
"Source": "BDU"
},
{
"RefID": "CVE-2018-1000654",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000654",
"Source": "CVE"
}
],
"Description": "This update upgrades libtasn1 to version 4.14-alt1. \nSecurity Fix(es):\n\n * BDU:2019-02509: Уязвимость функции _asn1_expand_object_id (p_tree) библиотеки Libtasn1 операционной системы Debian GNU/Linux, связанная с ошибками управления ресурсом, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-1000654: GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-08-08"
},
"Updated": {
"Date": "2019-08-08"
},
"BDUs": [
{
"ID": "BDU:2019-02509",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-399, CWE-400",
"Href": "https://bdu.fstec.ru/vul/2019-02509",
"Impact": "Low",
"Public": "20180812"
}
],
"CVEs": [
{
"ID": "CVE-2018-1000654",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000654",
"Impact": "Low",
"Public": "20180820"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20192415001",
"Comment": "libtasn1 is earlier than 0:4.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192415002",
"Comment": "libtasn1-devel is earlier than 0:4.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192415003",
"Comment": "libtasn1-devel-doc is earlier than 0:4.14-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192415004",
"Comment": "libtasn1-utils is earlier than 0:4.14-alt1"
}
]
}
]
}
}
]
}