Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 571102 - <net-libs/mbedtls-2.2.1: Double free and MD5 signature issue (SLOTH)
Summary: <net-libs/mbedtls-2.2.1: Double free and MD5 signature issue (SLOTH)
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Whiteboard: B3 [glsa cve]
Depends on:
Reported: 2016-01-06 18:54 UTC by Hanno Böck
Modified: 2017-06-20 17:46 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Hanno Böck gentoo-dev 2016-01-06 18:54:40 UTC
mbedtls has released updated versions that fix a double free vuln and an MD5 signature issue related to the SLOTH attack:

Here's the info about the SLOTH attack:

polarssl (the older name of mbedtls) is also affected, Gentoo currently still has an ebuild for polarssl 1.3.9. While upstream released an update for an old polarssl branch (1.2.19), there seems to be no update for polarssl 1.3.9. So polarssl probably should be removed completely.
Comment 1 Anthony Basile gentoo-dev 2017-01-28 17:56:10 UTC
all <net-libs/mbedtls-2.2.1 ebuilds are off the tree.  however all the polarssl ebuilds are vulnerable.  we should mask polarssl for removal.

@tommy do you want to take care of polarssl since its your package.
Comment 2 Thomas Sachau gentoo-dev 2017-05-13 13:55:26 UTC
The remaining packages depending on polarssl have open bugs assigned, bug 618354 tracks them.
Comment 3 Thomas Deutschmann gentoo-dev Security 2017-06-03 12:41:42 UTC
I split out net-libs/polarssl into bug 620504.

SLOTH issue is CVE-2015-7575.

Added to an existing GLSA.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2017-06-20 17:46:01 UTC
This issue was resolved and addressed in
 GLSA 201706-18 at
by GLSA coordinator Kristian Fiskerstrand (K_F).