ALT-PU-2020-2355-1
Closed vulnerabilities
BDU:2020-02674
Уязвимость реализации протоколов TLS и SSL программного обеспечения Mbed TLS, связанная с непринятием мер по шифрованию защищаемых данных, позволяющая нарушителю раскрыть закрытый ключ RSA
BDU:2022-01830
Уязвимость функций mbedtls_ecp_check_pub_priv, mbedtls_pk_parse_key, mbedtls_pk_parse_keyfile, mbedtls_ecp_mul, mbedtls_ecp_mul_restartable реализации протоколов TLS и SSL Mbed TLS, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-02080
Уязвимость реализации протоколов TLS и SSL Mbed TLS, связанная с передачей защищаемой информации в незашифрованном виде, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-02083
Уязвимость реализации протоколов TLS и SSL Mbed TLS, связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2019-18222
The ECDSA signature implementation in ecdsa.c in Arm Mbed Crypto 2.1 and Mbed TLS through 2.19.1 does not reduce the blinded scalar before computing the inverse, which allows a local attacker to recover the private key via side-channel attacks.
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- FEDORA-2020-5bcfae9f46
- FEDORA-2020-5bcfae9f46
- FEDORA-2020-8d3ea0fe8d
- FEDORA-2020-8d3ea0fe8d
- https://tls.mbed.org/tech-updates/security-advisories
- https://tls.mbed.org/tech-updates/security-advisories
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-12
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-12
Modified: 2024-11-21
CVE-2020-10932
An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. An attacker that can get precise enough side-channel measurements can recover the long-term ECDSA private key by (1) reconstructing the projective coordinate of the result of scalar multiplication by exploiting side channels in the conversion to affine coordinates; (2) using an attack described by Naccache, Smart, and Stern in 2003 to recover a few bits of the ephemeral scalar from those projective coordinates via several measurements; and (3) using a lattice attack to get from there to the long-term ECDSA private key used for the signatures. Typically an attacker would have sufficient access when attacking an SGX enclave and controlling the untrusted OS.
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- FEDORA-2020-9a6e8e63e9
- FEDORA-2020-42564738a1
- https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released
- https://tls.mbed.org/tech-updates/security-advisories
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-04
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-04
- https://tls.mbed.org/tech-updates/security-advisories
- https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released
- FEDORA-2020-42564738a1
- FEDORA-2020-9a6e8e63e9
Modified: 2024-11-21
CVE-2020-10941
Arm Mbed TLS before 2.16.5 allows attackers to obtain sensitive information (an RSA private key) by measuring cache usage during an import.
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- FEDORA-2020-fa74e15364
- FEDORA-2020-5b60029fe2
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-02
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-02
- FEDORA-2020-5b60029fe2
- FEDORA-2020-fa74e15364
Modified: 2024-11-21
CVE-2020-36421
An issue was discovered in Arm Mbed TLS before 2.23.0. Because of a side channel in modular exponentiation, an RSA private key used in a secure enclave could be disclosed.
- https://bugs.gentoo.org/730752
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/issues/3394
- https://github.com/ARMmbed/mbedtls/issues/3394
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
Modified: 2024-11-21
CVE-2020-36422
An issue was discovered in Arm Mbed TLS before 2.23.0. A side channel allows recovery of an ECC private key, related to mbedtls_ecp_check_pub_priv, mbedtls_pk_parse_key, mbedtls_pk_parse_keyfile, mbedtls_ecp_mul, and mbedtls_ecp_mul_restartable.
- https://bugs.gentoo.org/730752
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
Modified: 2024-11-21
CVE-2020-36423
An issue was discovered in Arm Mbed TLS before 2.23.0. A remote attacker can recover plaintext because a certain Lucky 13 countermeasure doesn't properly consider the case of a hardware accelerator.
- https://bugs.gentoo.org/730752
- https://bugs.gentoo.org/730752
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update