ALT-BU-2020-3787-1
Branch p9 update bulletin.
Closed bugs
Не запускается приложение blueberry (UI)
Package openssl1.1 updated to version 1.1.1g-alt1 for branch p9 in task 250580.
Closed vulnerabilities
BDU:2020-00300
Уязвимость функции PA-RISC CRYPTO_memcmp библиотеки OpenSSL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-02873
Уязвимость функции SSL_check_chain реализации протокола TLS библиотеки OpenSSL, связанная с с возможностью разыменования нулевого указателя в результате неправильной обработки TLS расширения «signature_algorithms_cert», позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-1551
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
- openSUSE-SU-2020:0062
- openSUSE-SU-2020:0062
- http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
- http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
- FEDORA-2020-da2d1ef2d7
- FEDORA-2020-da2d1ef2d7
- FEDORA-2020-d7b29838f6
- FEDORA-2020-d7b29838f6
- FEDORA-2020-fcc91a28e8
- FEDORA-2020-fcc91a28e8
- 20191225 [slackware-security] openssl (SSA:2019-354-01)
- 20191225 [slackware-security] openssl (SSA:2019-354-01)
- 20191229 [SECURITY] [DSA 4594-1] openssl1.0 security update
- 20191229 [SECURITY] [DSA 4594-1] openssl1.0 security update
- GLSA-202004-10
- GLSA-202004-10
- https://security.netapp.com/advisory/ntap-20191210-0001/
- https://security.netapp.com/advisory/ntap-20191210-0001/
- USN-4376-1
- USN-4376-1
- USN-4504-1
- USN-4504-1
- DSA-4594
- DSA-4594
- DSA-4855
- DSA-4855
- https://www.openssl.org/news/secadv/20191206.txt
- https://www.openssl.org/news/secadv/20191206.txt
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2019-09
- https://www.tenable.com/security/tns-2019-09
- https://www.tenable.com/security/tns-2020-03
- https://www.tenable.com/security/tns-2020-03
- https://www.tenable.com/security/tns-2020-11
- https://www.tenable.com/security/tns-2020-11
- https://www.tenable.com/security/tns-2021-10
- https://www.tenable.com/security/tns-2021-10
Modified: 2024-11-21
CVE-2020-1967
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
- openSUSE-SU-2020:0933
- openSUSE-SU-2020:0933
- openSUSE-SU-2020:0945
- openSUSE-SU-2020:0945
- http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html
- http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html
- 20200501 CVE-2020-1967: proving sigalg != NULL
- 20200501 CVE-2020-1967: proving sigalg != NULL
- [oss-security] 20200422 [CVE-2020-1967] OpenSSL 1.1.1d+ Segmentation fault in SSL_check_chain
- [oss-security] 20200422 [CVE-2020-1967] OpenSSL 1.1.1d+ Segmentation fault in SSL_check_chain
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=eb563247aef3e83dda7679c43f9649270462e5b1
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=eb563247aef3e83dda7679c43f9649270462e5b1
- https://github.com/irsl/CVE-2020-1967
- https://github.com/irsl/CVE-2020-1967
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440
- [tomcat-dev] 20200422 Re: Time for Tomcat Native 1.2.24?
- [tomcat-dev] 20200422 Re: Time for Tomcat Native 1.2.24?
- [tomcat-dev] 20200423 Re: Time for Tomcat Native 1.2.24?
- [tomcat-dev] 20200423 Re: Time for Tomcat Native 1.2.24?
- [tomcat-dev] 20200422 Time for Tomcat Native 1.2.24?
- [tomcat-dev] 20200422 Time for Tomcat Native 1.2.24?
- FEDORA-2020-da2d1ef2d7
- FEDORA-2020-da2d1ef2d7
- FEDORA-2020-d7b29838f6
- FEDORA-2020-d7b29838f6
- FEDORA-2020-fcc91a28e8
- FEDORA-2020-fcc91a28e8
- FreeBSD-SA-20:11
- FreeBSD-SA-20:11
- GLSA-202004-10
- GLSA-202004-10
- https://security.netapp.com/advisory/ntap-20200424-0003/
- https://security.netapp.com/advisory/ntap-20200424-0003/
- https://security.netapp.com/advisory/ntap-20200717-0004/
- https://security.netapp.com/advisory/ntap-20200717-0004/
- DSA-4661
- DSA-4661
- https://www.openssl.org/news/secadv/20200421.txt
- https://www.openssl.org/news/secadv/20200421.txt
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.synology.com/security/advisory/Synology_SA_20_05
- https://www.synology.com/security/advisory/Synology_SA_20_05
- https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL
- https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL
- https://www.tenable.com/security/tns-2020-03
- https://www.tenable.com/security/tns-2020-03
- https://www.tenable.com/security/tns-2020-04
- https://www.tenable.com/security/tns-2020-04
- https://www.tenable.com/security/tns-2020-11
- https://www.tenable.com/security/tns-2020-11
- https://www.tenable.com/security/tns-2021-10
- https://www.tenable.com/security/tns-2021-10
Package bubblewrap updated to version 0.4.1-alt1 for branch p9 in task 250707.
Closed vulnerabilities
BDU:2020-05810
Уязвимость приложения Bubblewrap, связанная с небезопасным управлением привилегиями, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
Modified: 2024-11-21
CVE-2020-5291
Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root permissions. Note that this only affects the combination of bubblewrap in setuid mode (which is typically used when unprivileged user namespaces are not supported) and the support of unprivileged user namespaces. Known to be affected are: * Debian testing/unstable, if unprivileged user namespaces enabled (not default) * Debian buster-backports, if unprivileged user namespaces enabled (not default) * Arch if using `linux-hardened`, if unprivileged user namespaces enabled (not default) * Centos 7 flatpak COPR, if unprivileged user namespaces enabled (not default) This has been fixed in the 0.4.1 release, and all affected users should update.
- https://github.com/containers/bubblewrap/commit/1f7e2ad948c051054b683461885a0215f1806240
- https://github.com/containers/bubblewrap/commit/1f7e2ad948c051054b683461885a0215f1806240
- https://github.com/containers/bubblewrap/security/advisories/GHSA-j2qp-rvxj-43vj
- https://github.com/containers/bubblewrap/security/advisories/GHSA-j2qp-rvxj-43vj