csaf2cusa/cvrfs/2023/cvrf-openEuler-SA-2023-1126.xml
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

150 lines
13 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for gnutls is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2023-1126</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2023-02-24</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2023-02-24</InitialReleaseDate>
<CurrentReleaseDate>2023-02-24</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2023-02-24</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">gnutls security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for gnutls is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, and other required structures. The project strives to provide a secure communications back-end, simple to use and integrated with the rest of the base Linux libraries. A back-end designed to work and be secure out of the box, keeping the complexity of TLS and PKI out of application code.
Security Fix(es):
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.(CVE-2023-0361)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for gnutls is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">gnutls</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1126</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-0361</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0361</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="gnutls-utils-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-utils-3.6.14-11.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debuginfo-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-debuginfo-3.6.14-11.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debugsource-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-debugsource-3.6.14-11.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-devel-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-devel-3.6.14-11.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-3.6.14-11.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debugsource-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-debugsource-3.6.14-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debuginfo-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-debuginfo-3.6.14-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-3.6.14-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-devel-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-devel-3.6.14-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-utils-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-utils-3.7.2-7.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debugsource-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-debugsource-3.7.2-7.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-devel-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-devel-3.7.2-7.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-3.7.2-7.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debuginfo-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-debuginfo-3.7.2-7.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-3.7.2-7.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-utils-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-utils-3.7.2-7.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debugsource-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-debugsource-3.7.2-7.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-devel-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-devel-3.7.2-7.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debuginfo-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-debuginfo-3.7.2-7.oe2203sp1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="gnutls-help-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-help-3.6.14-11.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="gnutls-help-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-help-3.6.14-10.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="gnutls-help-3.7.2-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-help-3.7.2-6.oe2203.noarch.rpm</FullProductName>
<FullProductName ProductID="gnutls-help-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-help-3.7.2-7.oe2203.noarch.rpm</FullProductName>
<FullProductName ProductID="gnutls-help-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-help-3.7.2-7.oe2203sp1.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="gnutls-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-3.6.14-11.oe1.src.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-3.6.14-10.oe1.src.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-3.7.2-7.oe2203.src.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-3.7.2-7.oe2203sp1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="gnutls-utils-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-utils-3.6.14-11.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-3.6.14-11.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-devel-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-devel-3.6.14-11.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debuginfo-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-debuginfo-3.6.14-11.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debugsource-3.6.14-11" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">gnutls-debugsource-3.6.14-11.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-3.6.14-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-devel-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-devel-3.6.14-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debugsource-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-debugsource-3.6.14-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debuginfo-3.6.14-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">gnutls-debuginfo-3.6.14-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-devel-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-devel-3.7.2-7.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-3.7.2-7.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-utils-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-utils-3.7.2-7.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debugsource-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-debugsource-3.7.2-7.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debuginfo-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">gnutls-debuginfo-3.7.2-7.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-utils-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-utils-3.7.2-7.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debuginfo-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-debuginfo-3.7.2-7.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-debugsource-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-debugsource-3.7.2-7.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-3.7.2-7.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="gnutls-devel-3.7.2-7" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">gnutls-devel-3.7.2-7.oe2203sp1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.</Note>
</Notes>
<ReleaseDate>2023-02-24</ReleaseDate>
<CVE>CVE-2023-0361</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>5.9</BaseScore>
<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>gnutls security update</Description>
<DATE>2023-02-24</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1126</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>