Upstream information
Description
** DISPUTED ** The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
National Vulnerability Database | SUSE | |
---|---|---|
Base Score | 5.9 | 5.9 |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
Access Vector | Network | Network |
Access Complexity | High | High |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality Impact | High | High |
Integrity Impact | None | None |
Availability Impact | None | None |
CVSSv3 Version | 3 | 3 |
- openSUSE-SU-2018:1329-1, published Thu, 17 May 2018 18:07:05 +0200 (CEST)
- openSUSE-SU-2018:1330-1, published Thu, 17 May 2018 18:07:41 +0200 (CEST)
- openSUSE-SU-2018:1347-1, published Sat, 19 May 2018 21:07:20 +0200 (CEST)
- openSUSE-SU-2018:1392-1, published Wed, 23 May 2018 21:22:04 +0200 (CEST)
- openSUSE-SU-2018:1393-1, published Wed, 23 May 2018 21:22:55 +0200 (CEST)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Workstation Extension 15 SP1 |
| |
SUSE Linux Enterprise Workstation Extension 15 SP2 |
| |
SUSE Linux Enterprise Workstation Extension 15 |
| |
SUSE Package Hub for SUSE Linux Enterprise 12 |
| Patchnames: openSUSE-2018-470 openSUSE-2019-395 |
openSUSE Leap 15.0 |
| Patchnames: openSUSE-2019-368 openSUSE-2019-395 |
openSUSE Leap 42.3 |
| Patchnames: openSUSE-2018-470 openSUSE-2019-395 |
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
Product(s) | Source package | State |
---|---|---|
SUSE Linux Enterprise Desktop 12 SP2 | evolution | Affected |
SUSE Linux Enterprise Desktop 12 SP2 | mutt | Affected |
SUSE Linux Enterprise Desktop 12 SP3 | evolution | Not affected |
SUSE Linux Enterprise Desktop 12 SP3 | mutt | Not affected |
SUSE Linux Enterprise Server 11 SP3 LTSS | mutt | Not affected |
SUSE Linux Enterprise Server 11 SP4 | mutt | Not affected |
SUSE Linux Enterprise Server 12 LTSS | mutt | Not affected |
SUSE Linux Enterprise Server 12 SP1 LTSS | mutt | Not affected |
SUSE Linux Enterprise Server 12 SP2 | mutt | Not affected |
SUSE Linux Enterprise Server 12 SP2 LTSS | mutt | Not affected |
SUSE Linux Enterprise Server 12 SP3 | mutt | Not affected |
SUSE Linux Enterprise Software Development Kit 11 SP4 | evolution | Not affected |
SUSE Linux Enterprise Software Development Kit 12 | evolution | Not affected |
SUSE Linux Enterprise Software Development Kit 12 SP3 | evolution | Not affected |
SUSE Linux Enterprise Workstation Extension 12 | evolution | Not affected |
SUSE Linux Enterprise Workstation Extension 12 SP2 | evolution | Not affected |