Ubuntu 4267-1: ARM mbed TLS vulnerabilities

    Date 05 Feb 2020
    258
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in mbedtls.
    ==========================================================================
    Ubuntu Security Notice USN-4267-1
    February 05, 2020
    
    mbedtls vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 16.04 LTS
    
    Summary:
    
    Several security issues were fixed in mbedtls.
    
    Software Description:
    - mbedtls: lightweight crypto and SSL/TLS library - crypto library
    
    Details:
    
    It was discovered that mbedtls has a bounds-check bypass through an integer
    overflow that can be used by an attacked to execute arbitrary code or cause a
    denial of service.
    (CVE-2017-18187)
    
    It was discovered that mbedtls has a vulnerability where an attacker could
    execute arbitrary code or cause a denial of service (buffer overflow)
    via a crafted certificate chain that is mishandled during RSASSA-PSS
    signature verification within a TLS or DTLS session.
    (CVE-2018-0487)
    
    It was discovered that mbedtls has a vulnerability where an attacker could
    execute arbitrary code or cause a denial of service (heap corruption) via a
    crafted application packet within a TLS or DTLS session.
    (CVE-2018-0488)
    
    It was discovered that mbedtls has a vulnerability that allows remote
    attackers to achieve partial plaintext recovery (for a CBC based ciphersuite)
    via a timing-based side-channel attack.
    (CVE-2018-0497)
    
    It was discovered that mbedtls has a vulnerability that allows local users to
    achieve partial plaintext recovery (for a CBC based ciphersuite) via a
    cache-based side-channel attack.
    (CVE-2018-0498)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 16.04 LTS:
      libmbedcrypto0                  2.2.1-2ubuntu0.3
      libmbedtls10                    2.2.1-2ubuntu0.3
      libmbedx509-0                   2.2.1-2ubuntu0.3
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4267-1
      CVE-2017-18187, CVE-2018-0487, CVE-2018-0488, CVE-2018-0497,
      CVE-2018-0498
    
    Package Information:
      https://launchpad.net/ubuntu/+source/mbedtls/2.2.1-2ubuntu0.3
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"3","type":"x","order":"1","pct":42.86,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"2","type":"x","order":"3","pct":28.57,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.