Bug 32844 - Update candidate: mbedtls 2.28.7
Summary: Update candidate: mbedtls 2.28.7
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: https://github.com/Mbed-TLS/mbedtls/r...
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-02-14 00:20 CET by Rémi Verschelde
Modified: 2024-02-15 00:03 CET (History)
4 users (show)

See Also:
Source RPM: mbedtls-2.28.3-1.mga9
CVE:
Status comment:


Attachments

Description Rémi Verschelde 2024-02-14 00:20:36 CET
Long overdue, sorry for the delay (2.28.3 -> 2.28.7).

Advisory:
=========

Updated mbedtls packages fix security vulnerabilities

  This update brings the mbedtls packages from 2.28.3 to the latest 2.28.7 release
  in the LTS branch, fixing a number of bugs as well the following security
  vulnerabilities:

  - Buffer overread in TLS stream cipher suites.
  - Timing side channel in private key RSA operations.
  - Buffer overflow in mbedtls_x509_set_extension.

  See the linked release notes for details.

References:

- https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.4
- https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.5
- https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.6
- https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.7
- https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/
- https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/
- https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/

SRPM in core/updates_testing:
=============================

mbedtls-2.28.7-1.mga9

RPMs in core/updates_testing:
=============================

lib64mbedcrypto7-2.28.7-1.mga9
lib64mbedtls14-2.28.7-1.mga9
lib64mbedx509_1-2.28.7-1.mga9
lib64mbedtls-devel-2.28.7-1.mga9
mbedtls-2.28.7-1.mga9
Marja Van Waes 2024-02-14 16:06:18 CET

URL: (none) => https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/ https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.4 https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.5 https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-2.28.5 https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.6 https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.7 https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/
CC: (none) => marja11

Comment 2 Marja Van Waes 2024-02-14 16:10:51 CET
(In reply to Rémi Verschelde from comment #1)
> > - https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.5
> 
> Not critical, but make that one:
> 
> > - https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-2.28.5

Advisory uploaded with that correction.

Keywords: (none) => advisory

Comment 3 Len Lawrence 2024-02-14 21:05:15 CET
Mageia9, x86_64
Installed the core packages then updated them from updates-testing.
Referred to bug 29234 for testing.
Reproducers for the vulnerabilities not available.

Installed godot and ran it under strace.
Brought up the blender scene creation gui, backed out, then created a dummy project, and downloaded some files from assetlib.
Closed down.
$ grep mbedtls godot.trace
openat(AT_FDCWD, "/usr/lib64/libmbedtls.so.14", O_RDONLY|O_CLOEXEC) = 3
$ grep crypto godot.trace
openat(AT_FDCWD, "/usr/lib64/libmbedcrypto.so.7", O_RDONLY|O_CLOEXEC) = 3
$ grep x509 godot.trace
openat(AT_FDCWD, "/usr/lib64/libmbedx509.so.1", O_RDONLY|O_CLOEXEC) = 3

As far as this goes the game engine functions and opens the libraries.

Giving this an OK for 64-bits.

CC: (none) => tarazed25
Whiteboard: (none) => MGA9-64-OK

Comment 4 Thomas Andrews 2024-02-14 22:04:18 CET
Validating.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Comment 5 Mageia Robot 2024-02-15 00:03:50 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0037.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.