drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in mbedtls
Name: |
Mehrere Probleme in mbedtls |
|
ID: |
USN-4267-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS |
|
Datum: |
Mi, 5. Februar 2020, 22:48 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18187 |
|
Applikationen: |
mbed TLS |
|
Originalnachricht |
--===============6553835068905594906== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="lkafhbzuv5nxhdqh" Content-Disposition: inline
--lkafhbzuv5nxhdqh Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4267-1 February 05, 2020
mbedtls vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in mbedtls.
Software Description: - mbedtls: lightweight crypto and SSL/TLS library - crypto library
Details:
It was discovered that mbedtls has a bounds-check bypass through an integer overflow that can be used by an attacked to execute arbitrary code or cause a denial of service. (CVE-2017-18187)
It was discovered that mbedtls has a vulnerability where an attacker could execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session. (CVE-2018-0487)
It was discovered that mbedtls has a vulnerability where an attacker could execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session. (CVE-2018-0488)
It was discovered that mbedtls has a vulnerability that allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. (CVE-2018-0497)
It was discovered that mbedtls has a vulnerability that allows local users to achieve partial plaintext recovery (for a CBC based ciphersuite) via a cache-based side-channel attack. (CVE-2018-0498)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: libmbedcrypto0 2.2.1-2ubuntu0.3 libmbedtls10 2.2.1-2ubuntu0.3 libmbedx509-0 2.2.1-2ubuntu0.3
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4267-1 CVE-2017-18187, CVE-2018-0487, CVE-2018-0488, CVE-2018-0497, CVE-2018-0498
Package Information: https://launchpad.net/ubuntu/+source/mbedtls/2.2.1-2ubuntu0.3
--lkafhbzuv5nxhdqh Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEkCdEQ5T6DutSveCybUp5kL3izGYFAl47Ex4ACgkQbUp5kL3i zGagJA//ZuV52SwAW0uHVTk8ms76lWZJdLPQEG+ay3D5aLhelDLsl4SykaqfiLDP 0qD8NASB2wVMzO6025sLd1ZJzttyr2by/p2A/wChnaH/pxbzvTzqAgljuvHEz0NJ 1KSka3tyVgNk1eXT0Ng6ME+y51H8hKe1PgG6c0KTpB4U11UwtcvePRDgSyAzjoEk iv9HTaswg21bEIIdUAixHxZPhcwg7BkPODblkCUG5aVt5ha9cp5eDX7/3NZFMw7a SNGJkYNHfmOh4/xIMJ/wZt8xbtoIDsuNpX0HyYByDdOXAkW0tdWbkgo1aemqInex 9O5QpXGCbmRK1AcBKJUc4Sdx49WRVJ3SIHraPQzI3Ld6KvfKOz9ZBNIMNUxFHDBP r6aFsOMbRkP4ZlWlPMS/PVOTPQtq4xF3PMjtojyKn8CXz2tEaUpiSQn7XfwiYTEr TBhsBxmZ1iq8xybrmv/tRlEBVcu2RcWcqhZ0H6/mbieyIw5v5K2zPCYdLa0I7Qwk 1es8MkKNSWu76WbQ27wMLRNcwjxvcYUhSZPsdR8DISGyfPzii0vmYJDiMP9JALmW Ul9PlGhd4HV1tENUgVDi3ZMfy+spscAVDLoA9zeJaz9IxjDmb1czRb86ag3ZAr2Y 6t8lAmPQGKKFYCt82lzMVJ0UFQu3CgLBxea6AMJawnCgnlPj1G0= =4NQl -----END PGP SIGNATURE-----
--lkafhbzuv5nxhdqh--
--===============6553835068905594906== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|