ALT-BU-2022-5916-1
Branch sisyphus_riscv64 update bulletin.
Package curl updated to version 7.85.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-06193
Уязвимость утилиты командной строки cURL, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-35252
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
- 20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
- 20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
- 20230123 APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3
- 20230123 APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3
- https://hackerone.com/reports/1613943
- https://hackerone.com/reports/1613943
- [debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
- [debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
- GLSA-202212-01
- GLSA-202212-01
- https://security.netapp.com/advisory/ntap-20220930-0005/
- https://security.netapp.com/advisory/ntap-20220930-0005/
- https://support.apple.com/kb/HT213603
- https://support.apple.com/kb/HT213603
- https://support.apple.com/kb/HT213604
- https://support.apple.com/kb/HT213604
Package wolfssl updated to version 5.5.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-38152
An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.
- http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html
- 20230119 wolfSSL before 5.5.0: Denial-of-service with session resumption
- https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
- https://github.com/tlspuffin/tlspuffin
- https://github.com/wolfSSL/wolfssl/pull/5468
- https://github.com/wolfSSL/wolfssl/releases
- https://www.wolfssl.com/docs/security-vulnerabilities/
- http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html
- https://www.wolfssl.com/docs/security-vulnerabilities/
- https://github.com/wolfSSL/wolfssl/releases
- https://github.com/wolfSSL/wolfssl/pull/5468
- https://github.com/tlspuffin/tlspuffin
- https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
- 20230119 wolfSSL before 5.5.0: Denial-of-service with session resumption
Modified: 2024-11-21
CVE-2022-42961
An issue was discovered in wolfSSL before 5.5.0. A fault injection attack on RAM via Rowhammer leads to ECDSA key disclosure. Users performing signing operations with private ECC keys, such as in server-side TLS connections, might leak faulty ECC signatures. These signatures can be processed via an advanced technique for ECDSA key recovery. (In 5.5.0 and later, WOLFSSL_CHECK_SIG_FAULTS can be used to address the vulnerability.)
Package make-initrd updated to version 2.28.0-alt0.1.rv64 for branch sisyphus_riscv64.
Closed bugs
make-initrd failure with custom kernel
Не работает пропись в /etc/luks.keys файла с паролем от LUKS раздела.
Добавить в luks поддержку /etc/crypttab
make-initrd ignores the value of LUKS_ALL_CRYPTTAB in /etc/initrd.mk