| Summary: | mbedtls new security issues fixed upstream in 1.3.18 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | herman.viaene, lewyssmith, sysadmin-bugs, tarazed25 |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://lwn.net/Vulnerabilities/713061/ | ||
| Whiteboard: | has_procedure MGA5-32-OK MGA5-64-OK advisory | ||
| Source RPM: | mbedtls-1.3.17-1.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2017-01-22 19:23:28 CET
The previous update was simply tested by running the mbedtls-selftest command. Whiteboard:
(none) =>
has_procedure Installed these on x86_64 real hardware and ran the selftest command. All tests passed. Since there is no bugtrail to follow, functionality tests are all we have. Updated to version 1.3.18 and ran the selftest again. Again, all tests passed. About to look at the other suggestions for testing. CC:
(none) =>
tarazed25 MGA5-32 on AsusA6000VM Xfce No installation issues Ran selftest, all tests passed, OK as in bug 18874. CC:
(none) =>
herman.viaene Moved to another 64bit machine and ran the update.
Installed hiawatha, stopped the lighttpd service and started hiawatha OK.
$ sudo systemctl start hiawatha
[lcl@vega python]$ systemctl status hiawatha
â hiawatha.service - Hiawatha Web Server
Loaded: loaded (/usr/lib/systemd/system/hiawatha.service; enabled)
Active: active (running) since Fri 2017-01-27 16:13:09 GMT; 17s ago
Process: 21101 ExecStartPre=/usr/sbin/hiawatha -k (code=exited, status=0/SUCCESS)
Process: 21097 ExecStartPre=/usr/sbin/wigwam (code=exited, status=0/SUCCESS)
Main PID: 21104 (hiawatha)
CGroup: /system.slice/hiawatha.service
ââ21104 /usr/sbin/hiawatha -d
Extract from output of
$ urpmq --requires hiawatha
....
hiawatha: libmbedtls.so.9()(64bit)
Closed firefox and restarted it without a problem and was able to reach sites not likely to be in the cache so this looks fine for x86_64.
Len Lawrence
2017-01-27 17:30:40 CET
Whiteboard:
has_procedure MGA5-32-OK =>
has_procedure MGA5-32-OK MGA5-64-OK Thanks you Len & Herman for speedy testing. Validating & Advisory-ing. Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2017-0030.html Status:
NEW =>
RESOLVED
David Walser
2017-01-31 04:51:32 CET
URL:
(none) =>
https://lwn.net/Vulnerabilities/713061/ |