ALT-BU-2020-3905-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2023-04-04
BDU:2020-05759
Уязвимость модуля crwimage_int.cpp библиотеки Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2023-11-21
BDU:2021-01492
Уязвимость функции Jp2Image::readMetadata() файла jp2image.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2023-09-13
BDU:2023-01655
Уязвимость компонента mrwimage.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-13504
There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.
- http://www.securityfocus.com/bid/109117
- https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/
- https://github.com/Exiv2/exiv2/pull/943
- https://lists.debian.org/debian-lts-announce/2019/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html
- http://www.securityfocus.com/bid/109117
- https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/
- https://github.com/Exiv2/exiv2/pull/943
- https://lists.debian.org/debian-lts-announce/2019/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html
Modified: 2024-11-21
CVE-2019-17402
Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.
- https://github.com/Exiv2/exiv2/issues/1019
- https://lists.debian.org/debian-lts-announce/2019/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html
- https://usn.ubuntu.com/4159-1/
- https://github.com/Exiv2/exiv2/issues/1019
- https://lists.debian.org/debian-lts-announce/2019/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html
- https://usn.ubuntu.com/4159-1/
Modified: 2024-11-21
CVE-2019-20421
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
- https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8
- https://github.com/Exiv2/exiv2/issues/1011
- https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html
- https://usn.ubuntu.com/4270-1/
- https://www.debian.org/security/2021/dsa-4958
- https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8
- https://github.com/Exiv2/exiv2/issues/1011
- https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html
- https://usn.ubuntu.com/4270-1/
- https://www.debian.org/security/2021/dsa-4958
Closed vulnerabilities
BDU:2022-01830
Уязвимость функций mbedtls_ecp_check_pub_priv, mbedtls_pk_parse_key, mbedtls_pk_parse_keyfile, mbedtls_ecp_mul, mbedtls_ecp_mul_restartable реализации протоколов TLS и SSL Mbed TLS, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-02080
Уязвимость реализации протоколов TLS и SSL Mbed TLS, связанная с передачей защищаемой информации в незашифрованном виде, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-02083
Уязвимость реализации протоколов TLS и SSL Mbed TLS, связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2020-36421
An issue was discovered in Arm Mbed TLS before 2.23.0. Because of a side channel in modular exponentiation, an RSA private key used in a secure enclave could be disclosed.
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/issues/3394
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/issues/3394
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
Modified: 2024-11-21
CVE-2020-36422
An issue was discovered in Arm Mbed TLS before 2.23.0. A side channel allows recovery of an ECC private key, related to mbedtls_ecp_check_pub_priv, mbedtls_pk_parse_key, mbedtls_pk_parse_keyfile, mbedtls_ecp_mul, and mbedtls_ecp_mul_restartable.
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
Modified: 2024-11-21
CVE-2020-36423
An issue was discovered in Arm Mbed TLS before 2.23.0. A remote attacker can recover plaintext because a certain Lucky 13 countermeasure doesn't properly consider the case of a hardware accelerator.
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
Closed bugs
Отсутствуют переводы на русский язык при некоторых сценариях входа
Package kernel-image-un-def updated to version 5.7.7-alt1 for branch sisyphus in task 254339.
Closed vulnerabilities
Modified: 2024-06-18
BDU:2020-03435
Уязвимость функции usbtest_disconnect ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-15393
In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
- https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
- https://lkml.org/lkml/2020/6/2/968
- https://usn.ubuntu.com/4463-1/
- https://usn.ubuntu.com/4465-1/
- https://usn.ubuntu.com/4483-1/
- https://usn.ubuntu.com/4485-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
- https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
- https://lkml.org/lkml/2020/6/2/968
- https://usn.ubuntu.com/4463-1/
- https://usn.ubuntu.com/4465-1/
- https://usn.ubuntu.com/4483-1/
- https://usn.ubuntu.com/4485-1/
Modified: 2024-11-21
CVE-2020-15780
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
- http://www.openwall.com/lists/oss-security/2020/07/20/7
- http://www.openwall.com/lists/oss-security/2020/07/29/3
- http://www.openwall.com/lists/oss-security/2020/07/30/2
- http://www.openwall.com/lists/oss-security/2020/07/30/3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- https://usn.ubuntu.com/4425-1/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4440-1/
- https://www.openwall.com/lists/oss-security/2020/06/15/3
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
- http://www.openwall.com/lists/oss-security/2020/07/20/7
- http://www.openwall.com/lists/oss-security/2020/07/29/3
- http://www.openwall.com/lists/oss-security/2020/07/30/2
- http://www.openwall.com/lists/oss-security/2020/07/30/3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- https://usn.ubuntu.com/4425-1/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4440-1/
- https://www.openwall.com/lists/oss-security/2020/06/15/3