ALT-BU-2020-3753-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2020-01727
Уязвимость криптографической библиотеки Python ECDSA, связанная с недостаточной обработкой исключительных состояний, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12904
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
- openSUSE-SU-2019:1792
- openSUSE-SU-2019:1792
- https://dev.gnupg.org/T4541
- https://dev.gnupg.org/T4541
- https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
- https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
- https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762
- https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
Modified: 2024-11-21
CVE-2019-13627
It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
- openSUSE-SU-2019:2161
- openSUSE-SU-2019:2161
- openSUSE-SU-2020:0022
- openSUSE-SU-2020:0022
- [oss-security] 20191002 Minerva: ECDSA key recovery from bit-length leakage
- [oss-security] 20191002 Minerva: ECDSA key recovery from bit-length leakage
- https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
- https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5
- [debian-lts-announce] 20190924 [SECURITY] [DLA 1931-1] libgcrypt20 security update
- [debian-lts-announce] 20190924 [SECURITY] [DLA 1931-1] libgcrypt20 security update
- [debian-lts-announce] 20200101 [SECURITY] [DLA 1931-2] libgcrypt20 regression update
- [debian-lts-announce] 20200101 [SECURITY] [DLA 1931-2] libgcrypt20 regression update
- https://minerva.crocs.fi.muni.cz/
- https://minerva.crocs.fi.muni.cz/
- GLSA-202003-32
- GLSA-202003-32
- https://security-tracker.debian.org/tracker/CVE-2019-13627
- https://security-tracker.debian.org/tracker/CVE-2019-13627
- USN-4236-1
- USN-4236-1
- USN-4236-2
- USN-4236-2
- USN-4236-3
- USN-4236-3
Closed vulnerabilities
BDU:2019-02942
Уязвимость сетевого программного средства SKS Keyserver и программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), связанная с отсутствием проверки хостовых данных сертификата, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-13050
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
- openSUSE-SU-2019:1917
- openSUSE-SU-2019:1917
- https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
- https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- FEDORA-2019-28a3675529
- FEDORA-2019-28a3675529
- FEDORA-2019-2f259a6c0a
- FEDORA-2019-2f259a6c0a
- https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
- https://support.f5.com/csp/article/K08654551
- https://support.f5.com/csp/article/K08654551
- https://support.f5.com/csp/article/K08654551?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K08654551?utm_source=f5support&%3Butm_medium=RSS
- https://twitter.com/lambdafu/status/1147162583969009664
- https://twitter.com/lambdafu/status/1147162583969009664
Closed vulnerabilities
BDU:2021-03353
Уязвимость функции read_metadata_vorbiscomment_() компонента src/libFLAC/stream_decoder.c аудиокодека FLAC, связанная с отсутствием освобождения ресурса после истечения действительного срока его эксплуатирования, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-6888
An error in the "read_metadata_vorbiscomment_()" function (src/libFLAC/stream_decoder.c) in FLAC version 1.3.2 can be exploited to cause a memory leak via a specially crafted FLAC file.
- https://git.xiph.org/?p=flac.git%3Ba=commit%3Bh=4f47b63e9c971e6391590caf00a0f2a5ed612e67
- https://git.xiph.org/?p=flac.git%3Ba=commit%3Bh=4f47b63e9c971e6391590caf00a0f2a5ed612e67
- [debian-lts-announce] 20210104 [SECURITY] [DLA 2514-1] flac security update
- [debian-lts-announce] 20210104 [SECURITY] [DLA 2514-1] flac security update
- FEDORA-2021-ed9c13a1d5
- FEDORA-2021-ed9c13a1d5
- FEDORA-2021-a48ccc6754
- FEDORA-2021-a48ccc6754
- https://secuniaresearch.flexerasoftware.com/advisories/82639/
- https://secuniaresearch.flexerasoftware.com/advisories/82639/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-7/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-7/
Package installer-feature-setup-plymouth updated to version 0.5.5-alt2 for branch p9 in task 249563.
Closed bugs
Не включает plymouth без LUKS