Bug 27869 - mbedtls new security issues fixed upstream in 2.16.9 (including CVE-2020-10932 and CVE-2020-3647[58])
Summary: mbedtls new security issues fixed upstream in 2.16.9 (including CVE-2020-1093...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, has_procedure, validated_update
Depends on:
Blocks:
 
Reported: 2020-12-18 20:30 CET by David Walser
Modified: 2021-11-25 01:05 CET (History)
3 users (show)

See Also:
Source RPM: mbedtls-2.16.8-1.mga7.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2020-12-18 20:30:57 CET
Fedora has issued an advisory today (December 18):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LO6LIL4J4QQPO2NYSTI6P3PQ766CJCIF/

2.16.9 was released on Decmeber 11 and fixes 4 security issues:
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9

Mageia 7 is also affected.
David Walser 2020-12-18 20:31:11 CET

Whiteboard: (none) => MGA7TOO

Comment 1 Rémi Verschelde 2020-12-18 21:50:27 CET
Fixed in Cauldron with mbedtls-2.16.9-1.mga8.

Update for Mageia 7:

Advisory:
=========

Updated mbedtls packages fix security vulnerabilities

  This update provides security bug fixes and minor enhancements.

  Security fixes:

  Limit the size of calculations performed by mbedtls_mpi_exp_mod to
  MBEDTLS_MPI_MAX_SIZE to prevent a potential denial of service when generating
  Diffie-Hellman key pairs.
  
  A failure of the random generator was ignored in mbedtls_mpi_fill_random(),
  which is how most uses of randomization in asymmetric cryptography are
  implemented. This could cause failures or the silent use of non-random values. 

  Fix a compliance issue whereby the library did not check the tag on the
  algorithm parameters (only the size) when comparing the signature in the
  description part of the cert to the real signature.

  Zeroising of local buffers and variables which are used for calculations in
  mbedtls_pkcs5_pbkdf2_hmac(), mbedtls_internal_sha*_process(),
  mbedtls_internal_md*_process() and mbedtls_internal_ripemd160_process()
  functions to erase sensitive data from memory.

References:

 - https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9


SRPM in core/updates_testing:
=============================

mbedtls-2.16.9-1.mga7

RPMs in core/updates_testing:
=============================

mbedtls-2.16.9-1.mga7
lib64mbedtls12-2.16.9-1.mga7
lib64mbedx509_0-2.16.9-1.mga7
lib64mbedcrypto3-2.16.9-1.mga7
lib64mbedtls-devel-2.16.9-1.mga7

Testing procedure:
==================

https://bugs.mageia.org/show_bug.cgi?id=26924#c1

Whiteboard: MGA7TOO => (none)
Assignee: rverschelde => qa-bugs
Version: Cauldron => 7
Keywords: (none) => has_procedure

Comment 2 Rémi Verschelde 2020-12-18 21:50:48 CET
(And thanks David for the report!)
Comment 3 Len Lawrence 2020-12-19 16:41:56 CET
mga7, x64

Updated the five packages.
Invoked the godot editor and startyed a new game project in an empty godot folder.  Browsed the assetlib, downloaded and installed 2D Shapes and Camera Shake.

Hoping that is sufficient.

Whiteboard: (none) => MGA7-64-OK
CC: (none) => tarazed25

Comment 4 Thomas Andrews 2020-12-21 14:26:11 CET
Validating. Advisory in Comment 1.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Comment 5 Aurelien Oudelet 2020-12-21 17:36:51 CET
Advisory pushed to SVN.

Source RPM: mbedtls-2.16.8-1.mga8.src.rpm => mbedtls-2.16.8-1.mga7.src.rpm
Keywords: (none) => advisory

Comment 6 Mageia Robot 2020-12-21 22:48:22 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2020-0469.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED

Comment 7 David Walser 2021-03-05 23:53:07 CET
One of these issues has CVE-2020-10932:
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXL26ADEMUDQB634BGFJBSDD6LVNPAKC/

Summary: mbedtls new security issues fixed upstream in 2.16.9 => mbedtls new security issues fixed upstream in 2.16.9 (including CVE-2020-10932)

Comment 8 David Walser 2021-11-25 01:05:50 CET
CVE-2020-3647[58] also fixed in this update:
https://www.debian.org/lts/security/2021/dla-2826

Summary: mbedtls new security issues fixed upstream in 2.16.9 (including CVE-2020-10932) => mbedtls new security issues fixed upstream in 2.16.9 (including CVE-2020-10932 and CVE-2020-3647[58])


Note You need to log in before you can comment on or make changes to this bug.