Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-15523

Опубликовано: 30 дек. 2020
Источник: debian

Описание

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
csync2fixed2.0-25-gc0faaf9-1package
csync2no-dsabusterpackage

Примечания

  • https://github.com/LINBIT/csync2/pull/13/commits/92742544a56bcbcd9ec99ca15f898b31797e39e2

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 5 лет назад

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.

CVSS3: 5.3
nvd
около 5 лет назад

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.

github
больше 3 лет назад

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.

suse-cvrf
больше 4 лет назад

Security update for csync2

suse-cvrf
больше 4 лет назад

Security update for csync2