ALT-BU-2017-3357-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-3641
bitcoind and Bitcoin-Qt prior to 0.10.2 allow attackers to cause a denial of service (disabled functionality such as a client application crash) via an "Easy" attack.
Modified: 2024-11-21
CVE-2016-10724
Bitcoin Core before v0.13.0 allows denial of service (memory exhaustion) triggered by the remote network alert system (deprecated since Q1 2016) if an attacker can sign a message with a certain private key that had been known by unintended actors, because of an infinitely sized map. This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins.
- https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure
- https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://github.com/JinBean/CVE-Extension
- https://github.com/JinBean/CVE-Extension
- https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html
- https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html
Modified: 2024-11-21
CVE-2016-10725
In Bitcoin Core before v0.13.0, a non-final alert is able to block the special "final alert" (which is supposed to override all other alerts) because operations occur in the wrong order. This behavior occurs in the remote network alert system (deprecated since Q1 2016). This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins.
- https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure
- https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://github.com/JinBean/CVE-Extension
- https://github.com/JinBean/CVE-Extension
- https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html
- https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html
Modified: 2024-11-21
CVE-2017-12842
Bitcoin Core before 0.14 allows an attacker to create an ostensibly valid SPV proof for a payment to a victim who uses an SPV wallet, even if that payment did not actually occur. Completing the attack would cost more than a million dollars, and is relevant mainly only in situations where an autonomous system relies solely on an SPV proof for transactions of a greater dollar amount.
- https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/
- https://bitslog.wordpress.com/2018/06/09/leaf-node-weakness-in-bitcoin-merkle-tree-design/
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html
- https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html
Closed vulnerabilities
BDU:2018-00007
Уязвимость библиотеки libgcrypt11, связанная с отсутствием защиты служебных данных, позволяющая нарушителю нарушить конфиденциальность данных
Modified: 2024-11-21
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- 100503
- 100503
- 1041294
- 1041294
- https://bugs.debian.org/873383
- https://bugs.debian.org/873383
- https://eprint.iacr.org/2017/806
- https://eprint.iacr.org/2017/806
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
- https://lists.debian.org/debian-security-announce/2017/msg00221.html
- https://lists.debian.org/debian-security-announce/2017/msg00221.html
- https://security.netapp.com/advisory/ntap-20180726-0002/
- https://security.netapp.com/advisory/ntap-20180726-0002/
- https://security-tracker.debian.org/tracker/CVE-2017-0379
- https://security-tracker.debian.org/tracker/CVE-2017-0379
- DSA-3959
- DSA-3959
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Modified: 2024-11-21
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
- 99338
- 99338
- 1038915
- 1038915
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
- https://eprint.iacr.org/2017/627
- https://eprint.iacr.org/2017/627
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9
- [gnupg-announce] 20170629 Libgcrypt 1.7.8 released to fix CVE-2017-7526
- [gnupg-announce] 20170629 Libgcrypt 1.7.8 released to fix CVE-2017-7526
- USN-3733-1
- USN-3733-1
- USN-3733-2
- USN-3733-2
- DSA-3901
- DSA-3901
- DSA-3960
- DSA-3960
Modified: 2024-11-21
CVE-2017-9526
In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library.
- DSA-3880
- DSA-3880
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- 99046
- 99046
- https://bugzilla.suse.com/show_bug.cgi?id=1042326
- https://bugzilla.suse.com/show_bug.cgi?id=1042326
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=5a22de904a0a366ae79f03ff1e13a1232a89e26b
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=5a22de904a0a366ae79f03ff1e13a1232a89e26b
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=f9494b3f258e01b6af8bd3941ce436bcc00afc56
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=f9494b3f258e01b6af8bd3941ce436bcc00afc56
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html