ALT-BU-2020-3905-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-05759
Уязвимость модуля crwimage_int.cpp библиотеки Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01492
Уязвимость функции Jp2Image::readMetadata() файла jp2image.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01655
Уязвимость компонента mrwimage.cpp библиотеки для управления метаданными медиафайлов Exiv2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-13504
There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.
- 109117
- 109117
- https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/
- https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/
- https://github.com/Exiv2/exiv2/pull/943
- https://github.com/Exiv2/exiv2/pull/943
- [debian-lts-announce] 20190719 [SECURITY] [DLA 1855-1] exiv2 security update
- [debian-lts-announce] 20190719 [SECURITY] [DLA 1855-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
Modified: 2024-11-21
CVE-2019-17402
Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.
- https://github.com/Exiv2/exiv2/issues/1019
- https://github.com/Exiv2/exiv2/issues/1019
- [debian-lts-announce] 20191202 [SECURITY] [DLA 2019-1] exiv2 security update
- [debian-lts-announce] 20191202 [SECURITY] [DLA 2019-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- USN-4159-1
- USN-4159-1
Modified: 2024-11-21
CVE-2019-20421
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
- https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8
- https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8
- https://github.com/Exiv2/exiv2/issues/1011
- https://github.com/Exiv2/exiv2/issues/1011
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- [debian-lts-announce] 20210830 [SECURITY] [DLA 2750-1] exiv2 security update
- USN-4270-1
- USN-4270-1
- DSA-4958
- DSA-4958
Closed vulnerabilities
BDU:2022-01830
Уязвимость функций mbedtls_ecp_check_pub_priv, mbedtls_pk_parse_key, mbedtls_pk_parse_keyfile, mbedtls_ecp_mul, mbedtls_ecp_mul_restartable реализации протоколов TLS и SSL Mbed TLS, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-02080
Уязвимость реализации протоколов TLS и SSL Mbed TLS, связанная с передачей защищаемой информации в незашифрованном виде, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-02083
Уязвимость реализации протоколов TLS и SSL Mbed TLS, связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2020-36421
An issue was discovered in Arm Mbed TLS before 2.23.0. Because of a side channel in modular exponentiation, an RSA private key used in a secure enclave could be disclosed.
- https://bugs.gentoo.org/730752
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/issues/3394
- https://github.com/ARMmbed/mbedtls/issues/3394
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
Modified: 2024-11-21
CVE-2020-36422
An issue was discovered in Arm Mbed TLS before 2.23.0. A side channel allows recovery of an ECC private key, related to mbedtls_ecp_check_pub_priv, mbedtls_pk_parse_key, mbedtls_pk_parse_keyfile, mbedtls_ecp_mul, and mbedtls_ecp_mul_restartable.
- https://bugs.gentoo.org/730752
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
Modified: 2024-11-21
CVE-2020-36423
An issue was discovered in Arm Mbed TLS before 2.23.0. A remote attacker can recover plaintext because a certain Lucky 13 countermeasure doesn't properly consider the case of a hardware accelerator.
- https://bugs.gentoo.org/730752
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
Closed bugs
Отсутствуют переводы на русский язык при некоторых сценариях входа
Package kernel-image-un-def updated to version 5.7.7-alt1 for branch sisyphus in task 254339.
Closed vulnerabilities
BDU:2020-03435
Уязвимость функции usbtest_disconnect ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-15393
In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
- openSUSE-SU-2020:1062
- openSUSE-SU-2020:1062
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1153
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lkml.org/lkml/2020/6/2/968
- https://lkml.org/lkml/2020/6/2/968
- USN-4463-1
- USN-4463-1
- USN-4465-1
- USN-4465-1
- USN-4483-1
- USN-4483-1
- USN-4485-1
- USN-4485-1
Modified: 2024-11-21
CVE-2020-15780
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1236
- openSUSE-SU-2020:1236
- [oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules
- [oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- USN-4425-1
- USN-4425-1
- USN-4426-1
- USN-4426-1
- USN-4439-1
- USN-4439-1
- USN-4440-1
- USN-4440-1
- https://www.openwall.com/lists/oss-security/2020/06/15/3
- https://www.openwall.com/lists/oss-security/2020/06/15/3