aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorTijl Coosemans <tijl@FreeBSD.org>2020-07-07 19:49:48 +0800
committerTijl Coosemans <tijl@FreeBSD.org>2020-07-07 19:49:48 +0800
commit231c993a00f2de0d440e96a9026986864d5fd53e (patch)
treeacee39a971577de25aac538d6e04a219dd7f67ef /security
parent993d0139414c3a312069891d24fb388197944782 (diff)
downloadfreebsd-ports-gnome-231c993a00f2de0d440e96a9026986864d5fd53e.tar.gz
freebsd-ports-gnome-231c993a00f2de0d440e96a9026986864d5fd53e.tar.zst
freebsd-ports-gnome-231c993a00f2de0d440e96a9026986864d5fd53e.zip
Document Mbed TLS security advisory 2020-07.
Security: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml38
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 11115f441a0c..4e3772254406 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,44 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c685edd9-c045-11ea-8898-001cc0382b2f">
+ <topic>Mbed TLS -- Side-channel attack on ECC key import and validation</topic>
+ <affects>
+ <package>
+ <name>mbedtls</name>
+ <range><lt>2.16.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Manuel Pégourié-Gonnard reports:</p>
+ <blockquote cite="https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07">
+ <p>The scalar multiplication function in Mbed TLS accepts a random
+ number generator (RNG) as an optional argument and, if provided,
+ uses it to protect against some attacks.</p>
+ <p>It is the caller's responsibility to provide a RNG if protection
+ against side-channel attacks is desired; however two groups of
+ functions in Mbed TLS itself fail to pass a RNG:</p>
+ <ol>
+ <li>mbedtls_pk_parse_key() and mbedtls_pk_parse_keyfile()</li>
+ <li>mbedtls_ecp_check_pub_priv() and mbedtls_pk_check_pair()</li>
+ </ol>
+ <p>When those functions are called, scalar multiplication is computed
+ without randomisation, a number of old and new attacks apply,
+ allowing a powerful local attacker to fully recover the private
+ key.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07</url>
+ </references>
+ <dates>
+ <discovery>2020-07-01</discovery>
+ <entry>2020-07-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f7a97d43-c039-11ea-a051-001b217b3468">
<topic>Gitlab -- Multiple Vulnerabilities</topic>
<affects>