ALT-BU-2018-3481-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1000224
Godot Engine version All versions prior to 2.1.5, all 3.0 versions prior to 3.0.6. contains a Signed/unsigned comparison, wrong buffer size chackes, integer overflow, missing padding initialization vulnerability in (De)Serialization functions (core/io/marshalls.cpp) that can result in DoS (packet of death), possible leak of uninitialized memory. This attack appear to be exploitable via A malformed packet is received over the network by a Godot application that uses built-in serialization (e.g. game server, or game client). Could be triggered by multiplayer opponent. This vulnerability appears to have been fixed in 2.1.5, 3.0.6, master branch after commit feaf03421dda0213382b51aff07bd5a96b29487b.
- https://github.com/godotengine/godot/issues/20558
- https://github.com/godotengine/godot/issues/20558
- https://godotengine.org/article/maintenance-release-godot-2-1-5
- https://godotengine.org/article/maintenance-release-godot-2-1-5
- https://godotengine.org/article/maintenance-release-godot-3-0-6
- https://godotengine.org/article/maintenance-release-godot-3-0-6
Package make-initrd updated to version 2.2.1-alt1 for branch sisyphus in task 213564.
Closed bugs
Ломает генерацию initrd и загрузку ОС
Package strongswan updated to version 5.7.0-alt1 for branch sisyphus in task 213588.
Closed vulnerabilities
BDU:2020-01851
Уязвимость функции verify_emsa_pkcs1_signature() плагина gmp IPSEC демона strongSwan, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2018-16151
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.
- openSUSE-SU-2019:2594
- openSUSE-SU-2019:2594
- openSUSE-SU-2019:2598
- openSUSE-SU-2019:2598
- openSUSE-SU-2020:0403
- openSUSE-SU-2020:0403
- [debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update
- [debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update
- GLSA-201811-16
- GLSA-201811-16
- USN-3771-1
- USN-3771-1
- DSA-4305
- DSA-4305
- https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-%28cve-2018-16151%2C-cve-2018-16152%29.html
- https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-%28cve-2018-16151%2C-cve-2018-16152%29.html
Modified: 2024-11-21
CVE-2018-16152
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.
- openSUSE-SU-2019:2594
- openSUSE-SU-2019:2594
- openSUSE-SU-2019:2598
- openSUSE-SU-2019:2598
- openSUSE-SU-2020:0403
- openSUSE-SU-2020:0403
- [debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update
- [debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update
- GLSA-201811-16
- GLSA-201811-16
- USN-3771-1
- USN-3771-1
- DSA-4305
- DSA-4305
- https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-%28cve-2018-16151%2C-cve-2018-16152%29.html
- https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-%28cve-2018-16151%2C-cve-2018-16152%29.html