ALT-PU-2021-4649-1
Package mbedtls updated to version 3.1.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-00710
Уязвимость функции mbedtls_ssl_set_session() реализация протоколов TLS и SSL Mbed TLS, связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-01625
Уязвимость функции mbedtls_pkcs12_derivation реализации протоколов TLS и SSL программного обеспечения Mbed TLS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01649
Уязвимость функции mbedtls_mpi_exp_mod реализации протоколов TLS и SSL Mbed TLS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02039
Уязвимость реализации протоколов TLS и SSL Mbed TLS, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-02236
Уязвимость реализации протоколов TLS и SSL Mbed TLS, связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2023-00604
Уязвимость функции mbedtls_mpi_exp_mod() (lignum.c) программного обеспечения Mbed TLS, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2020-36475
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.
- https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18
- [debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update
- [debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
Modified: 2024-11-21
CVE-2020-36478
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.
- https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf
- https://github.com/ARMmbed/mbedtls/issues/3629
- https://github.com/ARMmbed/mbedtls/issues/3629
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18
- [debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update
- [debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
Modified: 2024-11-21
CVE-2021-24119
In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.
- https://github.com/ARMmbed/mbedtls/releases
- https://github.com/ARMmbed/mbedtls/releases
- https://github.com/UzL-ITS/util-lookup/blob/main/cve-vulnerability-publication.md
- https://github.com/UzL-ITS/util-lookup/blob/main/cve-vulnerability-publication.md
- [debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update
- [debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- FEDORA-2021-10bfc067d1
- FEDORA-2021-10bfc067d1
- FEDORA-2021-165969af24
- FEDORA-2021-165969af24
Modified: 2024-11-21
CVE-2021-36647
Use of a Broken or Risky Cryptographic Algorithm in the function mbedtls_mpi_exp_mod() in lignum.c in Mbed TLS Mbed TLS all versions before 3.0.0, 2.27.0 or 2.16.11 allows attackers with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) to recover the private keys used in RSA.
- https://github.com/ARMmbed/mbedtls/releases/
- https://github.com/ARMmbed/mbedtls/releases/
- https://kouzili.com/Load-Step.pdf
- https://kouzili.com/Load-Step.pdf
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-07-1
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-07-1
Modified: 2024-11-21
CVE-2021-43666
A Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password's length is 0.
Modified: 2024-11-21
CVE-2021-44732
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.
- https://bugs.gentoo.org/829660
- https://bugs.gentoo.org/829660
- https://github.com/ARMmbed/mbedtls/releases
- https://github.com/ARMmbed/mbedtls/releases
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-12
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-12
Modified: 2024-11-21
CVE-2021-45450
In Mbed TLS before 2.28.0 and 3.x before 3.1.0, psa_cipher_generate_iv and psa_cipher_encrypt allow policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- FEDORA-2022-1dd9dc5140
- FEDORA-2022-1dd9dc5140
- FEDORA-2022-ff582c5b0d
- FEDORA-2022-ff582c5b0d
- GLSA-202301-08
- GLSA-202301-08
Modified: 2024-11-21
CVE-2021-45451
In Mbed TLS before 3.1.0, psa_aead_generate_nonce allows policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.