Security update for rage-encryption
| Announcement ID: | SUSE-SU-2023:4060-1 |
|---|---|
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves one vulnerability can now be installed.
Description:
This update for rage-encryption fixes the following issues:
-CVE-2023-42811: chosen ciphertext attack possible against aes-gcm (bsc#1215657)
-
update vendor.tar.zst to contain aes-gcm >= 0.10.3
-
Update to version 0.9.2+0:
-
CI: Ensure
aptrepository is up-to-date before installing build deps - CI: Build Linux releases using
ubuntu-20.04runner -
CI: Remove most uses of
actions-rsactions -
Update to version 0.9.2+0:
-
Fix changelog bugs and add missing entry
- Document
PINENTRY_PROGRAMenvironment variable - age: Add
Decryptor::new_async_buffered - age:
impl AsyncBufRead for ArmoredReader - Pre-initialize vectors when the capacity is known, or use arrays
- Use
PINENTRY_PROGRAMas environment variable forpinentry - Document why
impl AsyncWrite for StreamWriterdoesn't loop indefinitely - cargo update
- cargo vet prune
- Migrate to
cargo-vet 0.7 - build(deps): bump svenstaro/upload-release-action from 2.5.0 to 2.6.1
- Correct spelling in documentation
- build(deps): bump codecov/codecov-action from 3.1.1 to 3.1.4
- StreamWriter AsyncWrite: fix usage with futures::io::copy()
- rage: Use
Decryptor::new_buffered - age: Add
Decryptor::new_buffered - age:
impl BufRead for ArmoredReader - Update Homebrew formula to v0.9.1
-
feat/pinentry: Use env var to define pinentry binary
-
Update to version 0.9.1+0:
-
ssh: Fix parsing of OpenSSH private key format
- ssh: Support
aes256-gcm@openssh.comciphers for encrypted keys - ssh: Add
aes256-gcm@openssh.comcipher to test cases - ssh: Extract common key material derivation logic for encrypted keys
- ssh: Use associated constants for key and IV sizes
- ssh: Add test cases for encrypted keys
- Add shell completions for fish and zsh.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.5
zypper in -t patch SUSE-2023-4060=1 openSUSE-SLE-15.5-2023-4060=1 -
Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-4060=1
Package List:
-
openSUSE Leap 15.5 (aarch64 x86_64)
- rage-encryption-debuginfo-0.9.2+0-150500.3.3.1
- rage-encryption-0.9.2+0-150500.3.3.1
-
openSUSE Leap 15.5 (noarch)
- rage-encryption-bash-completion-0.9.2+0-150500.3.3.1
- rage-encryption-fish-completion-0.9.2+0-150500.3.3.1
- rage-encryption-zsh-completion-0.9.2+0-150500.3.3.1
-
Basesystem Module 15-SP5 (aarch64 x86_64)
- rage-encryption-debuginfo-0.9.2+0-150500.3.3.1
- rage-encryption-0.9.2+0-150500.3.3.1
-
Basesystem Module 15-SP5 (noarch)
- rage-encryption-bash-completion-0.9.2+0-150500.3.3.1