[Git][security-tracker-team/security-tracker][master] 2 commits: Slightly rewrap one long line NOTE

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed May 26 20:43:12 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f6b6e89c by Salvatore Bonaccorso at 2021-05-26T21:23:41+02:00
Slightly rewrap one long line NOTE

- - - - -
905d1ac3 by Salvatore Bonaccorso at 2021-05-26T21:42:46+02:00
Add CVE-2020-26558/linux

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -8097,7 +8097,9 @@ CVE-2021-30130 (phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS
 	NOTE: https://github.com/phpseclib/phpseclib/pull/1635#issuecomment-826994890
 	NOTE: Introduced by: https://github.com/phpseclib/phpseclib/commit/cc32cd2e95b18a0c0118bbf1928327675c9e64a9 (v3.0 / RSA::SIGNATURE_RELAXED_PKCS1)
 	NOTE: According to upstream, 1.x and 2.x are not vulnerable, the fix on these branches only backports more exhaustive PKCS#1 v1.5 support (functional change)
-	NOTE: According to upstream, 1.x and 2.x have the problem described as "incompatibility issue in phpseclib v1, v2, v3 (strict mode)'s RSA PKCS#1 v1.5 signature verification suffering from rejecting valid signatures whose encoded message uses implicit hash algorithm's NULL parameter." but this is not considered as a security problem.
+	NOTE: According to upstream, 1.x and 2.x have the problem described as "incompatibility issue in phpseclib v1, v2, v3 (strict mode)'s RSA PKCS#1 v1.5
+	NOTE: signature verification suffering from rejecting valid signatures whose encoded message uses implicit hash algorithm's NULL parameter." but
+	NOTE: this is not considered as a security problem.
 CVE-2021-30129
 	RESERVED
 CVE-2021-30128 (Apache OFBiz has unsafe deserialization prior to 17.12.07 version ...)
@@ -47167,7 +47169,10 @@ CVE-2020-26560 (Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 an
 CVE-2020-26559 (Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0. ...)
 	TODO: check
 CVE-2020-26558 (Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification ...)
-	TODO: check
+	- linux <unfixed>
+	NOTE: https://kb.cert.org/vuls/id/799380
+	NOTE: https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/
+	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1918602
 CVE-2020-26557 (Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may perm ...)
 	TODO: check
 CVE-2020-26556 (Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may perm ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/f363294b0d4e54a23a7fd457a19ce28b2a653068...905d1ac30d1e6c4006990f3014dde1894996fab0

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/f363294b0d4e54a23a7fd457a19ce28b2a653068...905d1ac30d1e6c4006990f3014dde1894996fab0
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210526/b264e303/attachment.htm>


More information about the debian-security-tracker-commits mailing list