ALT-BU-2016-2567-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-0886
Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
- JVN#77718330
- JVN#77718330
- JVNDB-2015-000033
- JVNDB-2015-000033
- FEDORA-2015-3120
- FEDORA-2015-3120
- FEDORA-2015-3032
- FEDORA-2015-3032
- FEDORA-2015-2994
- FEDORA-2015-2994
- http://www.mindrot.org/projects/jBCrypt/news/rel04.html
- http://www.mindrot.org/projects/jBCrypt/news/rel04.html
- https://bugzilla.mindrot.org/show_bug.cgi?id=2097
- https://bugzilla.mindrot.org/show_bug.cgi?id=2097
- [cassandra-commits] 20210924 [jira] [Commented] (CASSANDRA-16990) Update jbcrypt library to 0.4 from 0.3m to resolve CVE-2015-0886
- [cassandra-commits] 20210924 [jira] [Commented] (CASSANDRA-16990) Update jbcrypt library to 0.4 from 0.3m to resolve CVE-2015-0886
- [cassandra-commits] 20210924 [jira] [Updated] (CASSANDRA-16990) Update jbcrypt library to 0.4 from 0.3m to resolve CVE-2015-0886
- [cassandra-commits] 20210924 [jira] [Updated] (CASSANDRA-16990) Update jbcrypt library to 0.4 from 0.3m to resolve CVE-2015-0886
- [cassandra-commits] 20210924 [jira] [Created] (CASSANDRA-16990) Update jbcrypt library to 0.4 from 0.3m to resolve CVE-2015-0886
- [cassandra-commits] 20210924 [jira] [Created] (CASSANDRA-16990) Update jbcrypt library to 0.4 from 0.3m to resolve CVE-2015-0886
Package kernel-image-un-def updated to version 4.4.1-alt1 for branch sisyphus in task 157467.
Closed vulnerabilities
BDU:2016-00187
Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код на целевой системе
Modified: 2024-11-21
CVE-2016-0728
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
- FEDORA-2016-5d43766e33
- FEDORA-2016-5d43766e33
- FEDORA-2016-b59fd603be
- FEDORA-2016-b59fd603be
- SUSE-SU-2016:0205
- SUSE-SU-2016:0205
- SUSE-SU-2016:0341
- SUSE-SU-2016:0341
- SUSE-SU-2016:0745
- SUSE-SU-2016:0745
- SUSE-SU-2016:0746
- SUSE-SU-2016:0746
- SUSE-SU-2016:0747
- SUSE-SU-2016:0747
- SUSE-SU-2016:0750
- SUSE-SU-2016:0750
- SUSE-SU-2016:0751
- SUSE-SU-2016:0751
- SUSE-SU-2016:0752
- SUSE-SU-2016:0752
- SUSE-SU-2016:0753
- SUSE-SU-2016:0753
- SUSE-SU-2016:0755
- SUSE-SU-2016:0755
- SUSE-SU-2016:0756
- SUSE-SU-2016:0756
- SUSE-SU-2016:0757
- SUSE-SU-2016:0757
- http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
- http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
- RHSA-2016:0064
- RHSA-2016:0064
- RHSA-2016:0065
- RHSA-2016:0065
- RHSA-2016:0068
- RHSA-2016:0068
- http://source.android.com/security/bulletin/2016-03-01.html
- http://source.android.com/security/bulletin/2016-03-01.html
- DSA-3448
- DSA-3448
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
- [oss-security] 20160119 Linux kernel: use after free in keyring facility.
- [oss-security] 20160119 Linux kernel: use after free in keyring facility.
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 81054
- 81054
- 1034701
- 1034701
- USN-2870-1
- USN-2870-1
- USN-2870-2
- USN-2870-2
- USN-2871-1
- USN-2871-1
- USN-2871-2
- USN-2871-2
- USN-2872-1
- USN-2872-1
- USN-2872-2
- USN-2872-2
- USN-2872-3
- USN-2872-3
- USN-2873-1
- USN-2873-1
- https://bto.bluecoat.com/security-advisory/sa112
- https://bto.bluecoat.com/security-advisory/sa112
- https://bugzilla.redhat.com/show_bug.cgi?id=1297475
- https://bugzilla.redhat.com/show_bug.cgi?id=1297475
- https://github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
- https://github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
- HPSBHF03436
- HPSBHF03436
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://security.netapp.com/advisory/ntap-20160211-0001/
- https://security.netapp.com/advisory/ntap-20160211-0001/
- 39277
- 39277
Closed vulnerabilities
BDU:2016-00609
Уязвимость криптографической библиотеки Nettle, позволяющая нарушителю повлиять на целостность, доступность и конфиденциальность информации
BDU:2016-00708
Уязвимость криптографической библиотеки Nettle, позволяющая нарушителю повлиять на конфиденциальность, целостность и доступность защищаемой информации
BDU:2016-00709
Уязвимость криптографической библиотеки Nettle, позволяющая нарушителю повлиять на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2015-8803
The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
- FEDORA-2016-89968f88d2
- FEDORA-2016-89968f88d2
- FEDORA-2016-aa00f0631d
- FEDORA-2016-aa00f0631d
- FEDORA-2016-8ee88aee21
- FEDORA-2016-8ee88aee21
- openSUSE-SU-2016:0475
- openSUSE-SU-2016:0475
- openSUSE-SU-2016:0477
- openSUSE-SU-2016:0477
- openSUSE-SU-2016:0486
- openSUSE-SU-2016:0486
- RHSA-2016:2582
- RHSA-2016:2582
- [oss-security] 20160202 Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Re: Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Re: Miscomputations of elliptic curve scalar multiplications in Nettle
- USN-2897-1
- USN-2897-1
- https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
- https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
- https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d
- https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d
- [info-gnu] 20160128 ANNOUNCE: Nettle-3.2
- [info-gnu] 20160128 ANNOUNCE: Nettle-3.2
- [nettle-bugs] 20151212 secp256 calculation bug (already fixed)
- [nettle-bugs] 20151212 secp256 calculation bug (already fixed)
Modified: 2024-11-21
CVE-2015-8804
x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.
- openSUSE-SU-2016:0475
- openSUSE-SU-2016:0475
- openSUSE-SU-2016:0477
- openSUSE-SU-2016:0477
- openSUSE-SU-2016:0486
- openSUSE-SU-2016:0486
- RHSA-2016:2582
- RHSA-2016:2582
- [oss-security] 20160202 Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Re: Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Re: Miscomputations of elliptic curve scalar multiplications in Nettle
- USN-2897-1
- USN-2897-1
- https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
- https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
- https://git.lysator.liu.se/nettle/nettle/commit/fa269b6ad06dd13c901dbd84a12e52b918a09cd7
- https://git.lysator.liu.se/nettle/nettle/commit/fa269b6ad06dd13c901dbd84a12e52b918a09cd7
- [info-gnu] 20160128 ANNOUNCE: Nettle-3.2
- [info-gnu] 20160128 ANNOUNCE: Nettle-3.2
- [nettle-bugs] 20151211 Miscalculations on secp384 curve
- [nettle-bugs] 20151211 Miscalculations on secp384 curve
Modified: 2024-11-21
CVE-2015-8805
The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.
- openSUSE-SU-2016:0475
- openSUSE-SU-2016:0475
- openSUSE-SU-2016:0477
- openSUSE-SU-2016:0477
- openSUSE-SU-2016:0486
- openSUSE-SU-2016:0486
- RHSA-2016:2582
- RHSA-2016:2582
- [oss-security] 20160202 Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Re: Miscomputations of elliptic curve scalar multiplications in Nettle
- [oss-security] 20160202 Re: Miscomputations of elliptic curve scalar multiplications in Nettle
- 84272
- 84272
- USN-2897-1
- USN-2897-1
- https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
- https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html
- https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d
- https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d