| Summary: | mbedtls new security issues fixed in 2.16.10 and 2.16.11 (including CVE-2021-24119) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Rémi Verschelde <rverschelde> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, ouaurelien, sysadmin-bugs, tarazed25 |
| Version: | 8 | Keywords: | advisory, has_procedure, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | mbedtls-2.16.9-1.mga8 | CVE: | |
| Status comment: | |||
|
Description
Rémi Verschelde
2021-07-07 17:36:34 CEST
Rémi Verschelde
2021-07-07 17:36:41 CEST
Keywords:
(none) =>
has_procedure Corrected packages list: Reassigning as a security bug report. Updated packages in core/updates_testing: ======================== lib(64)mbedcrypto3-2.16.11-1.mga8 lib(64)mbedtls-devel-2.16.11-1.mga8 lib(64)mbedtls12-2.16.11-1.mga8 lib(64)mbedx509_0-2.16.11-1.mga8 mbedtls-2.16.11-1.mga8 SRPMs from 'core-updates_testing' ======================== mbedtls-2.16.11-1.mga8.src.rpm Component:
RPM Packages =>
Security mga8, x86_64 The security problems relate to "side channel attacks" - not within our scope to reproduce. Installed the six core packages then updated them. Elected to use the godot test procedure, starting a project then finding templates and browsing the assetlib and installing a couple of modules. $ grep mbedtls godot.trace openat(AT_FDCWD, "/lib64/libmbedtls.so.12", O_RDONLY|O_CLOEXEC) = 3 openat(AT_FDCWD, "/usr/lib64/libmbedtls.so.2.16.11", O_RDONLY) = 4 openat(AT_FDCWD, "/usr/lib64/libmbedtls.so.2.16.11", O_RDONLY) = 6 Searching for "tls" in the trace file turns up entries like: clone(child_stack=0x7f9a0061fe30, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[2399179], tls=0x7f9a00620640, child_tidptr=0x7f9a00620910) = 2399179 Giving this an OK for 64-bits. CC:
(none) =>
tarazed25 Validating. Advisory in Comment 0, with correct srpm in Comment 1.. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Aurelien Oudelet
2021-07-19 22:09:08 CEST
Keywords:
(none) =>
advisory An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0361.html Status:
NEW =>
RESOLVED One of the issues fixed in 2.16.10 has a CVE: https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.10 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/EYJW7HAW3TDV2YMDFYXP3HD6WRQRTLJW/ Summary:
mbedtls new security issues fixed in 2.16.10 and 2.16.11 =>
mbedtls new security issues fixed in 2.16.10 and 2.16.11 (including CVE-2021-24119) |