Summary: | <net-libs/mbedtls-2.4.2: multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Anthony Basile <blueness> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | blueness |
Priority: | Normal | Keywords: | STABLEREQ |
Version: | unspecified | Flags: | stable-bot:
sanity-check+
|
Hardware: | All | ||
OS: | Linux | ||
URL: | https://tls.mbed.org/tech-updates/releases/mbedtls-2.4.2-2.1.7-and-1.3.19-released | ||
Whiteboard: | B2 [glsa cve glsa] | ||
Package list: |
=net-libs/mbedtls-2.4.2
|
Runtime testing required: | --- |
Bug Depends on: | 619802 | ||
Bug Blocks: |
Description
Anthony Basile
2017-05-18 09:28:26 UTC
ppc stable. ppc64 stable. Stable for HPPA. amd64 stable x86 stable sparc stable Stable on alpha. Converting bug into security bug, 2.4.2 fixes multiple vulnerabilities: (2.4, 2.1, 1.3) Adds checks to prevent signature forgeries for very large messages while using RSA through the PK module in 64-bit systems. The issue was caused by some data loss when casting a size_t to an unsigned int value in the functions rsa_verify_wrap(), rsa_sign_wrap(), rsa_alt_sign_wrap() and mbedtls_pk_sign(). Found by Jean-Philippe Aumasson. (2.4, 2.1, 1.3) Fixes potential livelock during the parsing of a CRL in PEM format in the function mbedtls_x509_crl_parse(). A string containing a CRL followed by trailing characters after the footer could result in the execution of an infinite loop. The issue can be triggered remotely. Found by Greg Zaverucha, Microsoft. (2.4) Removes MD5 from the allowed hash algorithms for CertificateRequest and CertificateVerify messages, to prevent SLOTH attacks against TLS 1.2. Introduced by interoperability fix for #513. (2.4, 2.1, 1.3) Fixes a bug that caused freeing a buffer that was allocated on the stack, when verifying the validity of a key on secp224k1. This issue could be triggered remotely, such as with a maliciously constructed certificate and could potentially lead to remote code execution on some platforms. Reported independently by rongsaws and Aleksandar Nikolic, Cisco Talos team. #569 CVE-2017-2784 (2.4, 2.1, 1.3) Fixes multiple buffer overreads in mbedtls_pem_read_buffer() when parsing the input string in PEM format to extract the different components. Found by Eyal Itkin. (2.4, 2.1, 1.3) Fixes potential arithmetic overflow in mbedtls_ctr_drbg_reseed() that could cause buffer bound checks to be bypassed. Found by Eyal Itkin. (2.4, 2.1, 1.3) Fixes potential arithmetic overflows in mbedtls_cipher_update() that could cause buffer bound checks to be bypassed. Found by Eyal Itkin. (2.4, 2.1, 1.3) Fixes potential arithmetic overflow in mbedtls_md2_update() that could cause buffer bound checks to be bypassed. Found by Eyal Itkin. (2.4, 2.1, 1.3) Fixes potential arithmetic overflow in mbedtls_base64_decode() that could cause buffer bound checks to be bypassed. Found by Eyal Itkin. (2.4, 2.1, 1.3) Fixes a 1 byte buffer overflow in mbedtls_mpi_write_string() when the MPI number to write in hexadecimal is negative and requires an odd number of digits. Found and fixed by Guido Vranken. Added to an existing GLSA. This issue was resolved and addressed in GLSA 201706-18 at https://security.gentoo.org/glsa/201706-18 by GLSA coordinator Kristian Fiskerstrand (K_F). |