opensuse-su-2017:0792-1
Vulnerability from csaf_opensuse
Published
2017-03-22 10:02
Modified
2017-03-22 10:02
Summary
Security update for mbedtls

Notes

Title of the patch
Security update for mbedtls
Description of the patch
This update to mbedtls 1.3.19 fixes security issues and bugs. The following vulnerability was fixed: CVE-2017-2784: A remote user could have used a specially crafted certificate to cause mbedtls to free a buffer allocated on the stack when verifying the validity of public key with a secp224k1 curve, which could have allowed remote code execution on some platforms (boo#1029017) The following non-security changes are included: - Add checks to prevent signature forgeries for very large messages while using RSA through the PK module in 64-bit systems. - Fixed potential livelock during the parsing of a CRL in PEM format
Patchnames
openSUSE-2017-372
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for mbedtls",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update to mbedtls 1.3.19 fixes security issues and bugs.\n\nThe following vulnerability was fixed:\n\nCVE-2017-2784: A remote user could have used a specially crafted certificate to cause\n               mbedtls to free a buffer allocated on the stack when verifying the validity\n               of public key with a secp224k1 curve, which could have allowed remote\n               code execution on some platforms (boo#1029017)\n\nThe following non-security changes are included:\n\n- Add checks to prevent signature forgeries for very large messages while using RSA through\n  the PK module in 64-bit systems.\n- Fixed potential livelock during the parsing of a CRL in PEM format\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2017-372",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_0792-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2017:0792-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FAMN75AB4YE4LABPQEYS2NAM6F32VCFZ/#FAMN75AB4YE4LABPQEYS2NAM6F32VCFZ"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2017:0792-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FAMN75AB4YE4LABPQEYS2NAM6F32VCFZ/#FAMN75AB4YE4LABPQEYS2NAM6F32VCFZ"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1029017",
        "url": "https://bugzilla.suse.com/1029017"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-2784 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-2784/"
      }
    ],
    "title": "Security update for mbedtls",
    "tracking": {
      "current_release_date": "2017-03-22T10:02:23Z",
      "generator": {
        "date": "2017-03-22T10:02:23Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2017:0792-1",
      "initial_release_date": "2017-03-22T10:02:23Z",
      "revision_history": [
        {
          "date": "2017-03-22T10:02:23Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libmbedtls9-1.3.19-5.1.aarch64",
                "product": {
                  "name": "libmbedtls9-1.3.19-5.1.aarch64",
                  "product_id": "libmbedtls9-1.3.19-5.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "mbedtls-devel-1.3.19-5.1.aarch64",
                "product": {
                  "name": "mbedtls-devel-1.3.19-5.1.aarch64",
                  "product_id": "mbedtls-devel-1.3.19-5.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libmbedtls9-1.3.19-5.1.ppc64le",
                "product": {
                  "name": "libmbedtls9-1.3.19-5.1.ppc64le",
                  "product_id": "libmbedtls9-1.3.19-5.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "mbedtls-devel-1.3.19-5.1.ppc64le",
                "product": {
                  "name": "mbedtls-devel-1.3.19-5.1.ppc64le",
                  "product_id": "mbedtls-devel-1.3.19-5.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libmbedtls9-1.3.19-5.1.s390x",
                "product": {
                  "name": "libmbedtls9-1.3.19-5.1.s390x",
                  "product_id": "libmbedtls9-1.3.19-5.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "mbedtls-devel-1.3.19-5.1.s390x",
                "product": {
                  "name": "mbedtls-devel-1.3.19-5.1.s390x",
                  "product_id": "mbedtls-devel-1.3.19-5.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libmbedtls9-1.3.19-5.1.x86_64",
                "product": {
                  "name": "libmbedtls9-1.3.19-5.1.x86_64",
                  "product_id": "libmbedtls9-1.3.19-5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "mbedtls-devel-1.3.19-5.1.x86_64",
                "product": {
                  "name": "mbedtls-devel-1.3.19-5.1.x86_64",
                  "product_id": "mbedtls-devel-1.3.19-5.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Package Hub 12",
                "product": {
                  "name": "SUSE Package Hub 12",
                  "product_id": "SUSE Package Hub 12",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:packagehub:12"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmbedtls9-1.3.19-5.1.aarch64 as component of SUSE Package Hub 12",
          "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.aarch64"
        },
        "product_reference": "libmbedtls9-1.3.19-5.1.aarch64",
        "relates_to_product_reference": "SUSE Package Hub 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmbedtls9-1.3.19-5.1.ppc64le as component of SUSE Package Hub 12",
          "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.ppc64le"
        },
        "product_reference": "libmbedtls9-1.3.19-5.1.ppc64le",
        "relates_to_product_reference": "SUSE Package Hub 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmbedtls9-1.3.19-5.1.s390x as component of SUSE Package Hub 12",
          "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.s390x"
        },
        "product_reference": "libmbedtls9-1.3.19-5.1.s390x",
        "relates_to_product_reference": "SUSE Package Hub 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libmbedtls9-1.3.19-5.1.x86_64 as component of SUSE Package Hub 12",
          "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.x86_64"
        },
        "product_reference": "libmbedtls9-1.3.19-5.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mbedtls-devel-1.3.19-5.1.aarch64 as component of SUSE Package Hub 12",
          "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.aarch64"
        },
        "product_reference": "mbedtls-devel-1.3.19-5.1.aarch64",
        "relates_to_product_reference": "SUSE Package Hub 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mbedtls-devel-1.3.19-5.1.ppc64le as component of SUSE Package Hub 12",
          "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.ppc64le"
        },
        "product_reference": "mbedtls-devel-1.3.19-5.1.ppc64le",
        "relates_to_product_reference": "SUSE Package Hub 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mbedtls-devel-1.3.19-5.1.s390x as component of SUSE Package Hub 12",
          "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.s390x"
        },
        "product_reference": "mbedtls-devel-1.3.19-5.1.s390x",
        "relates_to_product_reference": "SUSE Package Hub 12"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mbedtls-devel-1.3.19-5.1.x86_64 as component of SUSE Package Hub 12",
          "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.x86_64"
        },
        "product_reference": "mbedtls-devel-1.3.19-5.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 12"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-2784",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-2784"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.aarch64",
          "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.ppc64le",
          "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.s390x",
          "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.x86_64",
          "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.aarch64",
          "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.ppc64le",
          "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.s390x",
          "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-2784",
          "url": "https://www.suse.com/security/cve/CVE-2017-2784"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1029017 for CVE-2017-2784",
          "url": "https://bugzilla.suse.com/1029017"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.aarch64",
            "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.ppc64le",
            "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.s390x",
            "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.x86_64",
            "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.aarch64",
            "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.ppc64le",
            "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.s390x",
            "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.aarch64",
            "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.ppc64le",
            "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.s390x",
            "SUSE Package Hub 12:libmbedtls9-1.3.19-5.1.x86_64",
            "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.aarch64",
            "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.ppc64le",
            "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.s390x",
            "SUSE Package Hub 12:mbedtls-devel-1.3.19-5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-03-22T10:02:23Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-2784"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…