ALT-BU-2014-3098-1
Branch t6 update bulletin.
Closed vulnerabilities
BDU:2015-09677
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09702
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2025-04-11
CVE-2012-2333
Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
- http://cvs.openssl.org/chngview?cn=22538
- http://cvs.openssl.org/chngview?cn=22547
- http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081460.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00020.html
- http://marc.info/?l=bugtraq&m=134919053717161&w=2
- http://marc.info/?l=bugtraq&m=134919053717161&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://rhn.redhat.com/errata/RHSA-2012-0699.html
- http://rhn.redhat.com/errata/RHSA-2012-1306.html
- http://rhn.redhat.com/errata/RHSA-2012-1307.html
- http://rhn.redhat.com/errata/RHSA-2012-1308.html
- http://secunia.com/advisories/49116
- http://secunia.com/advisories/49208
- http://secunia.com/advisories/49324
- http://secunia.com/advisories/50768
- http://secunia.com/advisories/51312
- http://support.apple.com/kb/HT5784
- http://www.cert.fi/en/reports/2012/vulnerability641549.html
- http://www.debian.org/security/2012/dsa-2475
- http://www.kb.cert.org/vuls/id/737740
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:073
- http://www.openssl.org/news/secadv_20120510.txt
- http://www.securityfocus.com/bid/53476
- http://www.securitytracker.com/id?1027057
- https://bugzilla.redhat.com/show_bug.cgi?id=820686
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75525
- http://cvs.openssl.org/chngview?cn=22538
- http://cvs.openssl.org/chngview?cn=22547
- http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081460.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00020.html
- http://marc.info/?l=bugtraq&m=134919053717161&w=2
- http://marc.info/?l=bugtraq&m=134919053717161&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://rhn.redhat.com/errata/RHSA-2012-0699.html
- http://rhn.redhat.com/errata/RHSA-2012-1306.html
- http://rhn.redhat.com/errata/RHSA-2012-1307.html
- http://rhn.redhat.com/errata/RHSA-2012-1308.html
- http://secunia.com/advisories/49116
- http://secunia.com/advisories/49208
- http://secunia.com/advisories/49324
- http://secunia.com/advisories/50768
- http://secunia.com/advisories/51312
- http://support.apple.com/kb/HT5784
- http://www.cert.fi/en/reports/2012/vulnerability641549.html
- http://www.debian.org/security/2012/dsa-2475
- http://www.kb.cert.org/vuls/id/737740
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:073
- http://www.openssl.org/news/secadv_20120510.txt
- http://www.securityfocus.com/bid/53476
- http://www.securitytracker.com/id?1027057
- https://bugzilla.redhat.com/show_bug.cgi?id=820686
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75525
Modified: 2025-04-11
CVE-2013-0166
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=66e8211c0b1347970096e04b18aa52567c325200
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ebc71865f0506a293242bd4aec97cdc7a8ef24b0
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=136396549913849&w=2
- http://marc.info/?l=bugtraq&m=136396549913849&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=137545771702053&w=2
- http://marc.info/?l=bugtraq&m=137545771702053&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0587.html
- http://rhn.redhat.com/errata/RHSA-2013-0782.html
- http://rhn.redhat.com/errata/RHSA-2013-0783.html
- http://rhn.redhat.com/errata/RHSA-2013-0833.html
- http://secunia.com/advisories/53623
- http://secunia.com/advisories/55108
- http://secunia.com/advisories/55139
- http://support.apple.com/kb/HT5880
- http://www.debian.org/security/2013/dsa-2621
- http://www.kb.cert.org/vuls/id/737740
- http://www.openssl.org/news/secadv_20130204.txt
- http://www.splunk.com/view/SP-CAAAHXG
- https://bugzilla.redhat.com/show_bug.cgi?id=908052
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18754
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19081
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19360
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19487
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=66e8211c0b1347970096e04b18aa52567c325200
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ebc71865f0506a293242bd4aec97cdc7a8ef24b0
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=136396549913849&w=2
- http://marc.info/?l=bugtraq&m=136396549913849&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=137545771702053&w=2
- http://marc.info/?l=bugtraq&m=137545771702053&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0587.html
- http://rhn.redhat.com/errata/RHSA-2013-0782.html
- http://rhn.redhat.com/errata/RHSA-2013-0783.html
- http://rhn.redhat.com/errata/RHSA-2013-0833.html
- http://secunia.com/advisories/53623
- http://secunia.com/advisories/55108
- http://secunia.com/advisories/55139
- http://support.apple.com/kb/HT5880
- http://www.debian.org/security/2013/dsa-2621
- http://www.kb.cert.org/vuls/id/737740
- http://www.openssl.org/news/secadv_20130204.txt
- http://www.splunk.com/view/SP-CAAAHXG
- https://bugzilla.redhat.com/show_bug.cgi?id=908052
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18754
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19081
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19360
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19487
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
Modified: 2025-04-11
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
- http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=136396549913849&w=2
- http://marc.info/?l=bugtraq&m=136396549913849&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=136439120408139&w=2
- http://marc.info/?l=bugtraq&m=136439120408139&w=2
- http://marc.info/?l=bugtraq&m=136733161405818&w=2
- http://marc.info/?l=bugtraq&m=136733161405818&w=2
- http://marc.info/?l=bugtraq&m=137545771702053&w=2
- http://marc.info/?l=bugtraq&m=137545771702053&w=2
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://rhn.redhat.com/errata/RHSA-2013-0587.html
- http://rhn.redhat.com/errata/RHSA-2013-0782.html
- http://rhn.redhat.com/errata/RHSA-2013-0783.html
- http://rhn.redhat.com/errata/RHSA-2013-0833.html
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://secunia.com/advisories/53623
- http://secunia.com/advisories/55108
- http://secunia.com/advisories/55139
- http://secunia.com/advisories/55322
- http://secunia.com/advisories/55350
- http://secunia.com/advisories/55351
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://support.apple.com/kb/HT5880
- http://www-01.ibm.com/support/docview.wss?uid=swg21644047
- http://www.debian.org/security/2013/dsa-2621
- http://www.debian.org/security/2013/dsa-2622
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://www.kb.cert.org/vuls/id/737740
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
- http://www.matrixssl.org/news.html
- http://www.openssl.org/news/secadv_20130204.txt
- http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
- http://www.securityfocus.com/bid/57778
- http://www.securitytracker.com/id/1029190
- http://www.splunk.com/view/SP-CAAAHXG
- http://www.ubuntu.com/usn/USN-1735-1
- http://www.us-cert.gov/cas/techalerts/TA13-051A.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
- https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608
- https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released
- https://puppet.com/security/cve/cve-2013-0169
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084
- http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=136396549913849&w=2
- http://marc.info/?l=bugtraq&m=136396549913849&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=136432043316835&w=2
- http://marc.info/?l=bugtraq&m=136439120408139&w=2
- http://marc.info/?l=bugtraq&m=136439120408139&w=2
- http://marc.info/?l=bugtraq&m=136733161405818&w=2
- http://marc.info/?l=bugtraq&m=136733161405818&w=2
- http://marc.info/?l=bugtraq&m=137545771702053&w=2
- http://marc.info/?l=bugtraq&m=137545771702053&w=2
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://rhn.redhat.com/errata/RHSA-2013-0587.html
- http://rhn.redhat.com/errata/RHSA-2013-0782.html
- http://rhn.redhat.com/errata/RHSA-2013-0783.html
- http://rhn.redhat.com/errata/RHSA-2013-0833.html
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- http://secunia.com/advisories/53623
- http://secunia.com/advisories/55108
- http://secunia.com/advisories/55139
- http://secunia.com/advisories/55322
- http://secunia.com/advisories/55350
- http://secunia.com/advisories/55351
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://support.apple.com/kb/HT5880
- http://www-01.ibm.com/support/docview.wss?uid=swg21644047
- http://www.debian.org/security/2013/dsa-2621
- http://www.debian.org/security/2013/dsa-2622
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://www.kb.cert.org/vuls/id/737740
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
- http://www.matrixssl.org/news.html
- http://www.openssl.org/news/secadv_20130204.txt
- http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
- http://www.securityfocus.com/bid/57778
- http://www.securitytracker.com/id/1029190
- http://www.splunk.com/view/SP-CAAAHXG
- http://www.ubuntu.com/usn/USN-1735-1
- http://www.us-cert.gov/cas/techalerts/TA13-051A.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
- https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608
- https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released
- https://puppet.com/security/cve/cve-2013-0169
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084