Date: Tue, 7 Jul 2020 11:49:48 +0000 (UTC) From: Tijl Coosemans <tijl@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r541413 - head/security/vuxml Message-ID: <202007071149.067Bnm4b000346@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: tijl Date: Tue Jul 7 11:49:48 2020 New Revision: 541413 URL: https://svnweb.freebsd.org/changeset/ports/541413 Log: Document Mbed TLS security advisory 2020-07. Security: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Jul 7 11:47:18 2020 (r541412) +++ head/security/vuxml/vuln.xml Tue Jul 7 11:49:48 2020 (r541413) @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="c685edd9-c045-11ea-8898-001cc0382b2f"> + <topic>Mbed TLS -- Side-channel attack on ECC key import and validation</topic> + <affects> + <package> + <name>mbedtls</name> + <range><lt>2.16.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Manuel Pégourié-Gonnard reports:</p> + <blockquote cite="https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07"> + <p>The scalar multiplication function in Mbed TLS accepts a random + number generator (RNG) as an optional argument and, if provided, + uses it to protect against some attacks.</p> + <p>It is the caller's responsibility to provide a RNG if protection + against side-channel attacks is desired; however two groups of + functions in Mbed TLS itself fail to pass a RNG:</p> + <ol> + <li>mbedtls_pk_parse_key() and mbedtls_pk_parse_keyfile()</li> + <li>mbedtls_ecp_check_pub_priv() and mbedtls_pk_check_pair()</li> + </ol> + <p>When those functions are called, scalar multiplication is computed + without randomisation, a number of old and new attacks apply, + allowing a powerful local attacker to fully recover the private + key.</p> + </blockquote> + </body> + </description> + <references> + <url>https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07</url> + </references> + <dates> + <discovery>2020-07-01</discovery> + <entry>2020-07-07</entry> + </dates> + </vuln> + <vuln vid="f7a97d43-c039-11ea-a051-001b217b3468"> <topic>Gitlab -- Multiple Vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202007071149.067Bnm4b000346>