alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-15T02:00:41Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5189firefox segfault on rpi 1 and 2 running armhf2019-07-15T02:00:41ZJohannes Ziemkefirefox segfault on rpi 1 and 2 running armhfHi,
firefox from edge/testing and community segfaults on a raspberry pi 1
and 2, both running an alpine stable base image\[1\].
strace:
futex(0x55f514a4, FUTEX\_WAKE\_PRIVATE, 1) = 1
recvmsg(4, 0x7eed05c4, 0) = –1 EAGAIN (Resource ...Hi,
firefox from edge/testing and community segfaults on a raspberry pi 1
and 2, both running an alpine stable base image\[1\].
strace:
futex(0x55f514a4, FUTEX\_WAKE\_PRIVATE, 1) = 1
recvmsg(4, 0x7eed05c4, 0) = –1 EAGAIN (Resource temporarily
unavailable)
poll(\[{fd=4, events=POLLIN}, {fd=5, events=POLLIN}, {fd=21,
events=POLLIN}\], 3, 0) = 1 (\[{fd=21, revents=POLLIN}\])
read(21, “\\372”, 1) = 1
futex(0x6d5a3a28, FUTEX\_WAKE\_PRIVATE, 1) = 1
futex(0x6d5cfa28, FUTEX\_WAKE\_PRIVATE, 1) = 1
futex(0x555c8174, FUTEX\_WAKE\_PRIVATE, 1) = 1
readlink(“/proc/self/exe”, “/usr/lib/firefox-42.0/firefox”, 4096) = 29
—- SIGSEGV {si\_signo=SIGSEGV, si\_code=SEGV\_MAPERR, si\_addr=0x18}
—-
unlink(“/root/.mozilla/firefox/giyrei07.default/lock”) = 0
close(6) = 0
rt\_sigaction(SIGSEGV, {SIG\_DFL, \[\], SA\_RESTORER, 0x76fa055c}, NULL,
8) = 0
rt\_sigprocmask(SIG\_UNBLOCK, \[SEGV\], NULL, 8) = 0
rt\_sigprocmask(SIG\_BLOCK, <sub>\[RTMIN\ RT\_1\ RT\_2\],</sub>\[KILL
SEGV STOP RTMIN RT\_1 RT\_2\], 8) = 0
gettid() = 448
tkill(448, SIGSEGV) = 0
rt\_sigprocmask(SIG\_SETMASK, ~\[KILL SEGV STOP RTMIN RT\_1 RT\_2\],
NULL, 8) = 0
—- SIGSEGV {si\_signo=SIGSEGV, si\_code=SI\_TKILL, si\_pid=448,
si\_uid=0} —-
<span class="underline"></span>+ killed by SIGSEGV <span
class="underline"></span>+
Segmentation fault
When I’m trying to run it in gdb though, it’s not crashing (although I
don’t know if it’s actually running since the system is headless right
now. Will update issue once I can verify it):
1. gdb /usr/lib/firefox-42.0/firefox
…
(gdb) run
Starting program: /usr/lib/firefox-42.0/firefox
\[New LWP 491\]
\[New LWP 492\]
\[New LWP 493\]
\[New LWP 494\]
\[New LWP 495\]
\[New LWP 496\]
\[New LWP 497\]
\[New LWP 498\]
\[New LWP 499\]
\[New LWP 500\]
\[New LWP 501\]
\[New LWP 502\]
\[New LWP 503\]
\[New LWP 504\]
1) https://github.com/discordianfish/alpine-arm-docker, deployed via
resin.io. Don’t think it’s related though.
*(from redmine: issue id 5189, created on 2016-02-25)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/5188Mongodb start failed2019-07-23T13:39:41ZalgitbotMongodb start failedmongo_1 | 2016-02-25T10:40:00.658+0000 I CONTROL [initandlisten] MongoDB starting : pid=7 port=27017 dbpath=/var/lib/mongodb 64-bit host=8ae2074f84da
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] db version v3.2....mongo_1 | 2016-02-25T10:40:00.658+0000 I CONTROL [initandlisten] MongoDB starting : pid=7 port=27017 dbpath=/var/lib/mongodb 64-bit host=8ae2074f84da
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] db version v3.2.3
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] git version: b326ba837cf6f49d65c2f85e1b70f6f31ece7937
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] allocator: system
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] modules: none
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] build environment:
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] distarch: x86_64
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] target_arch: x86_64
mongo_1 | 2016-02-25T10:40:00.663+0000 I CONTROL [initandlisten] options: { config: "/etc/mongodb.conf", net: { http: { enabled: false } }, storage: { dbPath: "/var/lib/mongodb", mmapv1: { preallocDataFiles: false, smallFiles: true } } }
mongo_1 | 2016-02-25T10:40:00.752+0000 I - [initandlisten] Detected data files in /var/lib/mongodb created by the 'wiredTiger' storage engine, so setting the active storage engine to 'wiredTiger'.
mongo_1 | 2016-02-25T10:40:00.752+0000 W - [initandlisten] Detected unclean shutdown - /var/lib/mongodb/mongod.lock is not empty.
mongo_1 | 2016-02-25T10:40:00.752+0000 W STORAGE [initandlisten] Recovering data from the last clean checkpoint.
mongo_1 | 2016-02-25T10:40:00.753+0000 I STORAGE [initandlisten] wiredtiger_open config: create,cache_size=1G,session_max=20000,eviction=(threads_max=4),config_base=false,statistics=(fast),log=(enabled=true,archive=true,path=journal,compressor=snappy),file_manager=(close_idle_time=100000),checkpoint=(wait=60,log_size=2GB),statistics_log=(wait=0),
mongo_1 | 2016-02-25T10:40:02.992+0000 I STORAGE [initandlisten] dropping unused ident: collection-2--3658185868592342520
mongo_1 | 2016-02-25T10:40:02.992+0000 E STORAGE [initandlisten] WiredTiger (22) [1456396802:992568][7:0x7fba0654f808], WT_SESSION.drop: unknown configuration key: 'lock_wait': Invalid argument
mongo_1 | 2016-02-25T10:40:02.992+0000 I - [initandlisten] Invariant failure: ret resulted in status BadValue: 22: Invalid argument at src/mongo/db/storage/wiredtiger/wiredtiger_kv_engine.cpp 553
mongo_1 | 2016-02-25T10:40:02.992+0000 I CONTROL [initandlisten] This platform does not support printing stacktraces
mongo_1 | 2016-02-25T10:40:02.992+0000 I - [initandlisten]
mongo_1 |
mongo_1 | ***aborting after invariant() failure
Here is my dockerfile:
FROM alpine:edge
RUN echo "@testing http://dl-4.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
RUN apk add --update \
mongodb@testing
WORKDIR /tmp
RUN mkdir -p /var/lib/mongodb
ADD mongodb.conf /etc/mongodb.conf
EXPOSE 27017
CMD /usr/bin/mongod --config /etc/mongodb.conf
and conf file:
1. mongodb.conf
<!-- -->
1. Where to store the data.
<!-- -->
1. Note: if you run mongodb as a non-root user (recommended) you may
2. need to create and set permissions for this directory manually,
3. e.g., if the parent directory isn’t mutable by the mongodb user.
dbpath=/var/lib/mongodb
\#where to log
\#logpath=/var/log/mongodb/mongodb.log
\#logappend=true
\#port = 27017
1. Disables write-ahead journaling
2. nojournal = true
<!-- -->
1. Enables periodic logging of CPU utilization and I/O wait
\#cpu = true
<!-- -->
1. Turn on/off security. Off is currently the default
\#noauth = true
\#auth = true
<!-- -->
1. Verbose logging output.
\#verbose = true
<!-- -->
1. Inspect all client data for validity on receipt (useful for
2. developing drivers)
\#objcheck = true
<!-- -->
1. Enable db quota management
\#quota = true
<!-- -->
1. Set oplogging level where n is
2. 0=off (default)
3. 1=W
4. 2=R
5. 3=both
6. 7=W+some reads
\#diaglog = 0
<!-- -->
1. Ignore query hints
\#nohints = true
<!-- -->
1. Disable the HTTP interface (Defaults to localhost:28017).
nohttpinterface = true
<!-- -->
1. Turns off server-side scripting. This will result in greatly limited
2. functionality
\#noscripting = true
<!-- -->
1. Turns off table scans. Any query that would do a table scan fails.
\#notablescan = true
<!-- -->
1. Disable data file preallocation.
noprealloc = true
smallfiles = true
<!-- -->
1. Specify .ns file size for new databases.
2. nssize = <size>
<!-- -->
1. Accout token for Mongo monitoring server.
\#mms-token = <token>
<!-- -->
1. Server name for Mongo monitoring server.
\#mms-name = <server-name>
<!-- -->
1. Ping interval for Mongo monitoring server.
\#mms-interval = <seconds>
<!-- -->
1. Replication Options
<!-- -->
1. in master/slave replicated mongo databases, specify here whether
2. this is a slave or master
\#slave = true
\#source = master.example.com
3. Slave only: specify a single database to replicate
\#only = master.example.com
4. or
\#master = true
\#source = slave.example.com
<!-- -->
1. in replica set configuration, specify the name of the replica set
2. replSet = setname
In some cases it starts after several tries (tried at different
machines), but never works after the first start.
*(from redmine: issue id 5188, created on 2016-02-25, closed on 2017-05-19)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/5187[3.0] nss: security issues (CVE-2015-7575, CVE-2016-1938)2019-07-23T13:39:42ZAlicha CH[3.0] nss: security issues (CVE-2015-7575, CVE-2016-1938)### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0,...### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0, improperly divides numbers,
which might make it easier for
remote attackers to defeat cryptographic protection mechanisms by
leveraging use of the (1) mp\_div or (2) mp\_exptmod function.
**Fixed in:** NSS 3.21
### Commit with the fix:
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
### References:
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
### (CVE-2015-7575) Prevent MD5 Downgrade in TLS 1.2 Signatures.
Mozilla Network Security Services (NSS) before 3.20.2, as used in
Mozilla
Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not
reject
MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake
Protocol traffic, which makes it easier for man-in-the-middle attackers
to
spoof servers by triggering a collision.
**Fixes in:** NSS 3.20.2
### References:
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS\_3.20.2\_release\_notes
https://www.mozilla.org/en-US/security/advisories/mfsa2015-150/
*(from redmine: issue id 5187, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5183
* Changesets:
* Revision 8dd1347d5787eed4fcb1908383288022acf2b16a on 2016-02-26T13:04:48Z:
```
main/nss: security fix (CVE-2015-7575, CVE-2016-1938). Fixes #5187
(cherry picked from commit 768394175984cfe44e9536dbcf5c4b822e3dd0b1)
```3.0.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5186[3.1] nss: security issues (CVE-2015-7575, CVE-2016-1938)2019-07-23T13:39:44ZAlicha CH[3.1] nss: security issues (CVE-2015-7575, CVE-2016-1938)### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0,...### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0, improperly divides numbers,
which might make it easier for
remote attackers to defeat cryptographic protection mechanisms by
leveraging use of the (1) mp\_div or (2) mp\_exptmod function.
**Fixed in:** NSS 3.21
### Commit with the fix:
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
### References:
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
### (CVE-2015-7575) Prevent MD5 Downgrade in TLS 1.2 Signatures.
Mozilla Network Security Services (NSS) before 3.20.2, as used in
Mozilla
Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not
reject
MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake
Protocol traffic, which makes it easier for man-in-the-middle attackers
to
spoof servers by triggering a collision.
**Fixes in:** NSS 3.20.2
### References:
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS\_3.20.2\_release\_notes
https://www.mozilla.org/en-US/security/advisories/mfsa2015-150/
*(from redmine: issue id 5186, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5183
* Changesets:
* Revision 768394175984cfe44e9536dbcf5c4b822e3dd0b1 on 2016-02-26T11:16:46Z:
```
main/nss: security fix (CVE-2015-7575, CVE-2016-1938). Fixes #5186
(cherry picked from commit bacf664c11b53ab5cb8224a2910b1e31dc6841e5)
```3.1.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5185[3.2] nss: security issues (CVE-2015-7575, CVE-2016-1938)2019-07-23T13:39:44ZAlicha CH[3.2] nss: security issues (CVE-2015-7575, CVE-2016-1938)### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0,...### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0, improperly divides numbers,
which might make it easier for
remote attackers to defeat cryptographic protection mechanisms by
leveraging use of the (1) mp\_div or (2) mp\_exptmod function.
**Fixed in:** NSS 3.21
### Commit with the fix:
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
### References:
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
### (CVE-2015-7575) Prevent MD5 Downgrade in TLS 1.2 Signatures.
Mozilla Network Security Services (NSS) before 3.20.2, as used in
Mozilla
Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not
reject
MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake
Protocol traffic, which makes it easier for man-in-the-middle attackers
to
spoof servers by triggering a collision.
**Fixes in:** NSS 3.20.2
### References:
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS\_3.20.2\_release\_notes
https://www.mozilla.org/en-US/security/advisories/mfsa2015-150/
*(from redmine: issue id 5185, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5183
* Changesets:
* Revision bacf664c11b53ab5cb8224a2910b1e31dc6841e5 on 2016-02-25T11:22:06Z:
```
main/nss: security fix (CVE-2015-7575, CVE-2016-1938). Fixes #5185
```3.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5184[3.3] nss: security issues (CVE-2015-7575, CVE-2016-1938)2019-07-23T13:39:45ZAlicha CH[3.3] nss: security issues (CVE-2015-7575, CVE-2016-1938)### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0,...### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0, improperly divides numbers,
which might make it easier for
remote attackers to defeat cryptographic protection mechanisms by
leveraging use of the (1) mp\_div or (2) mp\_exptmod function.
**Fixed in:** NSS 3.21
### Commit with the fix:
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
### References:
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
### (CVE-2015-7575) Prevent MD5 Downgrade in TLS 1.2 Signatures.
Mozilla Network Security Services (NSS) before 3.20.2, as used in
Mozilla
Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not
reject
MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake
Protocol traffic, which makes it easier for man-in-the-middle attackers
to
spoof servers by triggering a collision.
**Fixes in:** NSS 3.20.2
### References:
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS\_3.20.2\_release\_notes
https://www.mozilla.org/en-US/security/advisories/mfsa2015-150/
*(from redmine: issue id 5184, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5183
* Changesets:
* Revision 11b7294fe043943ed6b85a0e76b8dbba5d02b513 on 2016-02-25T10:46:06Z:
```
main/nss: security upgrade to 3.20.2 (CVE-2015-7575, CVE-2016-1938). Fixes #5184
```3.3.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5183nss: security issues (CVE-2015-7575, CVE-2016-1938)2019-07-23T13:39:46ZAlicha CHnss: security issues (CVE-2015-7575, CVE-2016-1938)### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0,...### (CVE-2016-1938) Calculations with mp\_div and mp\_exptmod in Network Security Services
The s\_mp\_div function in lib/freebl/mpi/mpi.c in Mozilla Network
Security Services (NSS) before 3.21,
as used in Mozilla Firefox before 44.0, improperly divides numbers,
which might make it easier for
remote attackers to defeat cryptographic protection mechanisms by
leveraging use of the (1) mp\_div or (2) mp\_exptmod function.
**Fixed in:** NSS 3.21
### Commit with the fix:
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
### References:
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
### (CVE-2015-7575) Prevent MD5 Downgrade in TLS 1.2 Signatures.
Mozilla Network Security Services (NSS) before 3.20.2, as used in
Mozilla
Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not
reject
MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake
Protocol traffic, which makes it easier for man-in-the-middle attackers
to
spoof servers by triggering a collision.
**Fixes in:** NSS 3.20.2
### References:
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS\_3.20.2\_release\_notes
https://www.mozilla.org/en-US/security/advisories/mfsa2015-150/
*(from redmine: issue id 5183, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* child #5184
* child #5185
* child #5186
* child #5187Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5182[3.0] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0...2019-07-23T13:39:47ZAlicha CH[3.0] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0787)During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library gener...During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library generating
numbers using only an 8th the number of random bits than what were
intended: 128 or 256 bits instead of 1023 or 2047
Using such drastically reduced amount of random bits for Diffie Hellman
weakended the handshake security significantly.
### Affected versions:
all versions to and including 1.6.0
### Fixed In Version:
libssh2 1.7.0
### References:
https://www.libssh2.org/adv\_20160223.html
### Patch:
https://www.libssh2.org/CVE-2016-0787.patch
*(from redmine: issue id 5182, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5177
* Changesets:
* Revision 688a2e4d988804f9f34688392292719f005228b5 on 2016-02-26T13:02:56Z:
```
main/libssh2: security fix (CVE-2016-0787). Fixes #5182
(cherry picked from commit 3bf1d9071528d84001ffc0f7565000af2c20023b)
```3.0.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5181[3.1] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0...2019-07-23T13:39:48ZAlicha CH[3.1] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0787)During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library gener...During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library generating
numbers using only an 8th the number of random bits than what were
intended: 128 or 256 bits instead of 1023 or 2047
Using such drastically reduced amount of random bits for Diffie Hellman
weakended the handshake security significantly.
### Affected versions:
all versions to and including 1.6.0
### Fixed In Version:
libssh2 1.7.0
### References:
https://www.libssh2.org/adv\_20160223.html
### Patch:
https://www.libssh2.org/CVE-2016-0787.patch
*(from redmine: issue id 5181, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5177
* Changesets:
* Revision 3bf1d9071528d84001ffc0f7565000af2c20023b on 2016-02-26T11:12:09Z:
```
main/libssh2: security fix (CVE-2016-0787). Fixes #5181
(cherry picked from commit 172d419b0e074112384b90baca96f8494e026a72)
```3.1.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5180[3.2] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0...2019-07-23T13:39:50ZAlicha CH[3.2] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0787)During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library gener...During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library generating
numbers using only an 8th the number of random bits than what were
intended: 128 or 256 bits instead of 1023 or 2047
Using such drastically reduced amount of random bits for Diffie Hellman
weakended the handshake security significantly.
### Affected versions:
all versions to and including 1.6.0
### Fixed In Version:
libssh2 1.7.0
### References:
https://www.libssh2.org/adv\_20160223.html
### Patch:
https://www.libssh2.org/CVE-2016-0787.patch
*(from redmine: issue id 5180, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5177
* Changesets:
* Revision 172d419b0e074112384b90baca96f8494e026a72 on 2016-02-25T11:22:06Z:
```
main/libssh2: security fix (CVE-2016-0787). Fixes #5180
```3.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5179[3.3] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0...2019-07-23T13:39:51ZAlicha CH[3.3] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0787)During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library gener...During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library generating
numbers using only an 8th the number of random bits than what were
intended: 128 or 256 bits instead of 1023 or 2047
Using such drastically reduced amount of random bits for Diffie Hellman
weakended the handshake security significantly.
### Affected versions:
all versions to and including 1.6.0
### Fixed In Version:
libssh2 1.7.0
### References:
https://www.libssh2.org/adv\_20160223.html
### Patch:
https://www.libssh2.org/CVE-2016-0787.patch
*(from redmine: issue id 5179, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5177
* Changesets:
* Revision 1ac4d544686cfe3f747f0239d54530c5cb71be88 on 2016-02-25T10:32:54Z:
```
main/libssh2: security fix (CVE-2016-0787). Fixes #5179
```3.3.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5178[3.4] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0...2019-07-23T13:39:52ZAlicha CH[3.4] libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0787)During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library gener...During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library generating
numbers using only an 8th the number of random bits than what were
intended: 128 or 256 bits instead of 1023 or 2047
Using such drastically reduced amount of random bits for Diffie Hellman
weakended the handshake security significantly.
### Affected versions:
all versions to and including 1.6.0
### Fixed In Version:
libssh2 1.7.0
### References:
https://www.libssh2.org/adv\_20160223.html
### Patch:
https://www.libssh2.org/CVE-2016-0787.patch
*(from redmine: issue id 5178, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5177
* Changesets:
* Revision c4c2b245a1141cec029d5c70e6445c3428346bdc on 2016-02-24T15:56:36Z:
```
main/libssh2: security upgrade to 1.7.0 (CVE-2016-0787). Fixes #5178
```3.4.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5177libssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0787)2019-07-23T13:39:53ZAlicha CHlibssh2: Wrong calculation of Diffie Helllman secret length (CVE-2016-0787)During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library gener...During the SSHv2 handshake when libssh2 is to get a suitable value for
‘group order’ in the Diffle Hellman negotiation,
it would pass in number of bytes to a function that expected number of
bits. This would result in the library generating
numbers using only an 8th the number of random bits than what were
intended: 128 or 256 bits instead of 1023 or 2047
Using such drastically reduced amount of random bits for Diffie Hellman
weakended the handshake security significantly.
### Affected versions:
all versions to and including 1.6.0
### Fixed In Version:
libssh2 1.7.0
### References:
https://www.libssh2.org/adv\_20160223.html
### Patch:
https://www.libssh2.org/CVE-2016-0787.patch
*(from redmine: issue id 5177, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* child #5178
* child #5179
* child #5180
* child #5181
* child #5182Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5176[3.0] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman sec...2019-07-23T13:39:54ZAlicha CH[3.0] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret length (CVE-2016-0739)libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long,...libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long, instead of the recommended sizes
of 1024
and 2048 bits respectively. There are practical algorithms (Baby
steps/Giant
steps, Pollard’s rho) that can solve this problem in O (2^63)
operations.
### Fixed In Version:
libssh 0.7.3
### References:
https://www.libssh.org/security/advisories/CVE-2016-0739.txt
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-0739
*(from redmine: issue id 5176, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5171
* Changesets:
* Revision b06eb65c2514f30d61c14b70fe796163e1c5c86d on 2016-02-26T12:59:41Z:
```
main/libssh: upgrade to 0.6.5, security fix (CVE-2016-0739). Fixes #5176
(cherry picked from commit ac98067334bc13e50408a0ae33e4416c12d30e35)
```3.0.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5175[3.1] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman sec...2019-07-23T13:39:55ZAlicha CH[3.1] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret length (CVE-2016-0739)libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long,...libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long, instead of the recommended sizes
of 1024
and 2048 bits respectively. There are practical algorithms (Baby
steps/Giant
steps, Pollard’s rho) that can solve this problem in O (2^63)
operations.
### Fixed In Version:
libssh 0.7.3
### References:
https://www.libssh.org/security/advisories/CVE-2016-0739.txt
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-0739
*(from redmine: issue id 5175, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5171
* Changesets:
* Revision ac98067334bc13e50408a0ae33e4416c12d30e35 on 2016-02-26T11:05:20Z:
```
main/libssh: upgrade to 0.6.5, security fix (CVE-2016-0739). Fixes #5175
(cherry picked from commit 8fd14512598c4438817e0c3b405cfa648fc72898)
```3.1.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5174[3.2] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman sec...2019-07-23T13:39:56ZAlicha CH[3.2] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret length (CVE-2016-0739)libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long,...libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long, instead of the recommended sizes
of 1024
and 2048 bits respectively. There are practical algorithms (Baby
steps/Giant
steps, Pollard’s rho) that can solve this problem in O (2^63)
operations.
### Fixed In Version:
libssh 0.7.3
### References:
https://www.libssh.org/security/advisories/CVE-2016-0739.txt
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-0739
*(from redmine: issue id 5174, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5171
* Changesets:
* Revision 8fd14512598c4438817e0c3b405cfa648fc72898 on 2016-02-25T11:22:06Z:
```
main/libssh: security fix (CVE-2016-0739). Fixes #5174
```3.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5173[3.3] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman sec...2019-07-23T13:39:57ZAlicha CH[3.3] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret length (CVE-2016-0739)libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long,...libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long, instead of the recommended sizes
of 1024
and 2048 bits respectively. There are practical algorithms (Baby
steps/Giant
steps, Pollard’s rho) that can solve this problem in O (2^63)
operations.
### Fixed In Version:
libssh 0.7.3
### References:
https://www.libssh.org/security/advisories/CVE-2016-0739.txt
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-0739
*(from redmine: issue id 5173, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5171
* Changesets:
* Revision 3ffde6161c4951006a14b23b6b89131114c846d4 on 2016-02-25T10:30:33Z:
```
main/libssh: security upgrade to 0.7.3 (CVE-2016-0739). Fixes #5173
(cherry picked from commit 8967b28bae04756e804afa403733139e2adedfdb)
```3.3.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5172[3.4] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman sec...2019-07-23T13:39:58ZAlicha CH[3.4] libssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret length (CVE-2016-0739)libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long,...libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long, instead of the recommended sizes
of 1024
and 2048 bits respectively. There are practical algorithms (Baby
steps/Giant
steps, Pollard’s rho) that can solve this problem in O (2^63)
operations.
### Fixed In Version:
libssh 0.7.3
### References:
https://www.libssh.org/security/advisories/CVE-2016-0739.txt
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-0739
*(from redmine: issue id 5172, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* parent #5171
* Changesets:
* Revision 8967b28bae04756e804afa403733139e2adedfdb on 2016-02-24T15:55:20Z:
```
main/libssh: security upgrade to 0.7.3 (CVE-2016-0739). Fixes #5172
```3.4.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5171libssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret le...2019-07-23T13:39:59ZAlicha CHlibssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret length (CVE-2016-0739)libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long,...libssh versions 0.1 and above have a bits/bytes confusion bug and
generate the
an anormaly short ephemeral secret for the diffie-hellman-group1 and
diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long, instead of the recommended sizes
of 1024
and 2048 bits respectively. There are practical algorithms (Baby
steps/Giant
steps, Pollard’s rho) that can solve this problem in O (2^63)
operations.
### Fixed In Version:
libssh 0.7.3
### References:
https://www.libssh.org/security/advisories/CVE-2016-0739.txt
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-0739
*(from redmine: issue id 5171, created on 2016-02-24, closed on 2016-03-01)*
* Relations:
* child #5172
* child #5173
* child #5174
* child #5175
* child #5176Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5170[3.0] nettle: Miscomputations of elliptic curve scalar multiplications (CVE-2...2019-07-23T13:40:00ZAlicha CH[3.0] nettle: Miscomputations of elliptic curve scalar multiplications (CVE-2015-8803, CVE-2015-8804, CVE-2015-8805)**CVE-2015-8803, CVE-2015-8805:** secp256 calculation bug
Patch:
https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d.patch
**CVE-2015-8804:** miscalculations on secp384 curve
Patch:
https://git.lys...**CVE-2015-8803, CVE-2015-8805:** secp256 calculation bug
Patch:
https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d.patch
**CVE-2015-8804:** miscalculations on secp384 curve
Patch:
https://git.lysator.liu.se/nettle/nettle/commit/fa269b6ad06dd13c901dbd84a12e52b918a09cd7.patch
They affect the NIST P-256 and P-384 curves. The P-256 bug is
in the C code and affects multiple architectures. The P-384 bug is in
the assembly code and only affects 64 bit x86.
### Fixed In Version:
Nettle 3.2 fixes all three bugs.
### References:
http://seclists.org/oss-sec/2016/q1/266
https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003028.html
https://bugzilla.redhat.com/show\_bug.cgi?id=1304303
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2015-8804
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2015-8805
*(from redmine: issue id 5170, created on 2016-02-23, closed on 2016-03-01)*
* Relations:
* parent #5165
* Changesets:
* Revision dffdb25189c631ad6bfce4965c741df5964e446d on 2016-02-26T12:56:30Z:
```
main/nettle: security fix (CVE-2015-8803, CVE-2015-8804, CVE-2015-8805). Fixes #5170
(cherry picked from commit bc1b8cdb81f24f01d962fc29e48ca02bf09d6ec7)
```3.0.7