Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mbedtls
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mbedtls
ID: USN-4267-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS
Datum: Mi, 5. Februar 2020, 22:48
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18187
Applikationen: mbed TLS

Originalnachricht


--===============6553835068905594906==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="lkafhbzuv5nxhdqh"
Content-Disposition: inline


--lkafhbzuv5nxhdqh
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4267-1
February 05, 2020

mbedtls vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in mbedtls.

Software Description:
- mbedtls: lightweight crypto and SSL/TLS library - crypto library

Details:

It was discovered that mbedtls has a bounds-check bypass through an integer
overflow that can be used by an attacked to execute arbitrary code or cause a
denial of service.
(CVE-2017-18187)

It was discovered that mbedtls has a vulnerability where an attacker could
execute arbitrary code or cause a denial of service (buffer overflow)
via a crafted certificate chain that is mishandled during RSASSA-PSS
signature verification within a TLS or DTLS session.
(CVE-2018-0487)

It was discovered that mbedtls has a vulnerability where an attacker could
execute arbitrary code or cause a denial of service (heap corruption) via a
crafted application packet within a TLS or DTLS session.
(CVE-2018-0488)

It was discovered that mbedtls has a vulnerability that allows remote
attackers to achieve partial plaintext recovery (for a CBC based ciphersuite)
via a timing-based side-channel attack.
(CVE-2018-0497)

It was discovered that mbedtls has a vulnerability that allows local users to
achieve partial plaintext recovery (for a CBC based ciphersuite) via a
cache-based side-channel attack.
(CVE-2018-0498)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
libmbedcrypto0 2.2.1-2ubuntu0.3
libmbedtls10 2.2.1-2ubuntu0.3
libmbedx509-0 2.2.1-2ubuntu0.3

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4267-1
CVE-2017-18187, CVE-2018-0487, CVE-2018-0488, CVE-2018-0497,
CVE-2018-0498

Package Information:
https://launchpad.net/ubuntu/+source/mbedtls/2.2.1-2ubuntu0.3

--lkafhbzuv5nxhdqh
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=4NQl
-----END PGP SIGNATURE-----

--lkafhbzuv5nxhdqh--


--===============6553835068905594906==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung