Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-2239

Опубликовано: 02 мая 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-2239: skopeo security update (MODERATE)

[2:1.14.3-0.1]

[2:1.14.1-2]

  • Switch to the maint branch
  • Related: Jira:RHEL-2112

[2:1.14.1-1]

[2:1.14.0-1]

  • bump to v1.14.0
  • Related: Jira:RHEL-2112

[2:1.13.3-3]

  • Rebuild with golang 1.20.10
  • Related: Jira:RHEL-2786

[2:1.13.3-2]

  • Rebuild with golang 1.21.3
  • Related: Jira:RHEL-2786

[2:1.13.3-1]

[2:1.13.2-1]

[2:1.13.1-1]

[2:1.13.0-1]

[2:1.12.0-3]

  • rebuild for following CVEs: CVE-2022-41724 CVE-2022-41725 CVE-2023-24537 CVE-2023-24538 CVE-2023-24534 CVE-2023-24536 CVE-2022-41723 CVE-2023-24539 CVE-2023-24540 CVE-2023-29400
  • Resolves: #2179967
  • Resolves: #2187323
  • Resolves: #2187384
  • Resolves: #2203703
  • Resolves: #2207523

[2:1.12.0-2]

  • remove fakeroot from skopeo-tests
  • Related: #2176063

[2:1.12.0-1]

  • update to 1.12.0
  • Related: #2176063

[2:1.11.3-0.1]

[2:1.11.2-0.2]

[2:1.11.2-0.1]

[2:1.11.1-1]

[2:1.11.0-1]

  • update to 1.11.0 release
  • Related: #2124478

[2:1.11.0-0.4]

[2:1.11.0-0.3]

[2:1.11.0-0.2]

[2:1.11.0-0.1]

[2:1.10.0-1]

[2:1.9.3-1]

[2:1.9.2-1]

[2:1.9.1-1]

[2:1.9.0-1]

[2:1.8.0-4]

  • Re-enable debuginfo
  • Related: #2061316

[2:1.8.0-3]

  • BuildRequires: /usr/bin/go-md2man
  • Related: #2061316

[2:1.8.0-2]

  • enable LTO
  • Related: #1988128

[2:1.8.0-1]

[2:1.7.0-1]

[2:1.6.1-4]

  • add tags: classic (Ed Santiago)
  • Related: #2061316

[2:1.6.1-3]

  • remove BATS from required packages (Ed Santiago)
  • Related: #2061316

[2:1.6.1-2]

  • be sure to install BATS before gating tests are executed (thanks to Ed Santiago)
  • Related: #2061316

[2:1.6.1-1]

[2:1.6.0-1]

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

skopeo

1.14.3-0.1.el9

skopeo-tests

1.14.3-0.1.el9

Oracle Linux x86_64

skopeo

1.14.3-0.1.el9

skopeo-tests

1.14.3-0.1.el9

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
nvd
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
debian
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
github
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

oracle-oval
около 1 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

Уязвимость ELSA-2024-2239