ALT-BU-2014-2926-1
Branch t7 update bulletin.
Closed vulnerabilities
BDU:2015-09792
Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2019-01635
Уязвимость генератора псевдослучайных чисел библиотеки криптографии Libgcrypt, связанная с раскрытием информации, позволяющая нарушителю прогнозировать выходные данные
Modified: 2024-11-21
CVE-2014-5270
Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
- [gnupg-announce] 20140808 [security fix] Libgcrypt and GnuPG
- [gnupg-announce] 20140808 [security fix] Libgcrypt and GnuPG
- [oss-security] 20140816 Re: CVE request: libgcrypt, ELGAMAL side-channel attack
- [oss-security] 20140816 Re: CVE request: libgcrypt, ELGAMAL side-channel attack
- http://www.cs.tau.ac.il/~tromer/handsoff/
- http://www.cs.tau.ac.il/~tromer/handsoff/
- DSA-3024
- DSA-3024
- DSA-3073
- DSA-3073
Modified: 2024-11-21
CVE-2016-6313
The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
- RHSA-2016:2674
- RHSA-2016:2674
- DSA-3649
- DSA-3649
- DSA-3650
- DSA-3650
- 92527
- 92527
- 1036635
- 1036635
- USN-3064-1
- USN-3064-1
- USN-3065-1
- USN-3065-1
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=blob_plain%3Bf=NEWS
- [gnupg-announce] 20160817 [Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316]
- [gnupg-announce] 20160817 [Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316]
- GLSA-201610-04
- GLSA-201610-04
- GLSA-201612-01
- GLSA-201612-01
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-3564
Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git%3Ba=commit%3Bh=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
- http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git%3Ba=commit%3Bh=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
- [oss-security] 20140731 CVE-2014-3564 gpgme: heap-based buffer overflow in gpgsm status handler
- [oss-security] 20140731 CVE-2014-3564 gpgme: heap-based buffer overflow in gpgsm status handler
- DSA-3005
- DSA-3005
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 109699
- 109699
- 68990
- 68990
- https://bugzilla.redhat.com/show_bug.cgi?id=1113267
- https://bugzilla.redhat.com/show_bug.cgi?id=1113267