Lucene search

K
gentooGentoo FoundationGLSA-202105-07
HistoryMay 26, 2021 - 12:00 a.m.

Telegram: Security bypass

2021-05-2600:00:00
Gentoo Foundation
security.gentoo.org
39
telegram
security
active session
upgrade

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

30.9%

Background

Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed.

Description

It was discovered that Telegram failed to invalidate a recently active session.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Telegram users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-im/telegram-desktop-2.4.11"

All Telegram binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=net-im/telegram-desktop-bin-2.4.11"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-im/telegram-desktop< 2.4.11UNKNOWN
Gentooanyallnet-im/telegram-desktop-bin< 2.4.11UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

30.9%