Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2532-1

Опубликовано: 22 июл. 2022
Источник: suse-cvrf

Описание

Security update for python-M2Crypto

This update for python-M2Crypto fixes the following issues:

  • CVE-2020-25657: Fixed Bleichenbacher timing attacks in the RSA decryption API (bsc#1178829).

Список пакетов

Image SLES15-SP4
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Azure-Basic
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Azure-Standard
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-EC2-ECS-HVM
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-HPC
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-HPC-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-HPC-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-HPC-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-HPC-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-HPC-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-HPC-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-HPC-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Hardened-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Hardened-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Hardened-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Hardened-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-3
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-3-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-3-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-3-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-3-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-3-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-3-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-3-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-4
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-4-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-4-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-4-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-4-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-4-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-4-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Micro-5-4-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Hardened
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Hardened-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Hardened-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Hardened-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAP-Hardened-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAPCAL
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAPCAL-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAPCAL-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-SAPCAL-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Azure-3P
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Azure-Basic
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Azure-Standard
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-EC2-ECS-HVM
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-HPC-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-HPC-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-HPC-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-HPC-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-HPC-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-HPC-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Hardened-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Hardened-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Hardened-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0-Azure-llc
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0-Azure-ltd
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0-EC2-llc
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Manager-Server-5-0-EC2-ltd
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Micro-5-5
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Micro-5-5-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Micro-5-5-BYOS
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Micro-5-5-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Micro-5-5-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Micro-5-5-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Micro-5-5-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-Micro-5-5-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-Azure-3P
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-Hardened-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-Hardened-BYOS-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-Hardened-BYOS-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-Hardened-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAP-Hardened-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAPCAL-Azure
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAPCAL-EC2
python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP5-SAPCAL-GCE
python3-M2Crypto-0.38.0-150400.3.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP4
python3-M2Crypto-0.38.0-150400.3.3.1
openSUSE Leap 15.4
python-M2Crypto-doc-0.38.0-150400.3.3.1
python3-M2Crypto-0.38.0-150400.3.3.1

Описание

A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.


Затронутые продукты
Image SLES15-SP4-Azure-Basic:python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-Azure-Standard:python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-BYOS-Azure:python3-M2Crypto-0.38.0-150400.3.3.1
Image SLES15-SP4-BYOS-EC2:python3-M2Crypto-0.38.0-150400.3.3.1

Ссылки
Уязвимость SUSE-SU-2022:2532-1