diff options
author | Tijl Coosemans <tijl@FreeBSD.org> | 2020-07-07 19:49:48 +0800 |
---|---|---|
committer | Tijl Coosemans <tijl@FreeBSD.org> | 2020-07-07 19:49:48 +0800 |
commit | 231c993a00f2de0d440e96a9026986864d5fd53e (patch) | |
tree | acee39a971577de25aac538d6e04a219dd7f67ef /security | |
parent | 993d0139414c3a312069891d24fb388197944782 (diff) | |
download | freebsd-ports-gnome-231c993a00f2de0d440e96a9026986864d5fd53e.tar.gz freebsd-ports-gnome-231c993a00f2de0d440e96a9026986864d5fd53e.tar.zst freebsd-ports-gnome-231c993a00f2de0d440e96a9026986864d5fd53e.zip |
Document Mbed TLS security advisory 2020-07.
Security: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 11115f441a0c..4e3772254406 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="c685edd9-c045-11ea-8898-001cc0382b2f"> + <topic>Mbed TLS -- Side-channel attack on ECC key import and validation</topic> + <affects> + <package> + <name>mbedtls</name> + <range><lt>2.16.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Manuel Pégourié-Gonnard reports:</p> + <blockquote cite="https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07"> + <p>The scalar multiplication function in Mbed TLS accepts a random + number generator (RNG) as an optional argument and, if provided, + uses it to protect against some attacks.</p> + <p>It is the caller's responsibility to provide a RNG if protection + against side-channel attacks is desired; however two groups of + functions in Mbed TLS itself fail to pass a RNG:</p> + <ol> + <li>mbedtls_pk_parse_key() and mbedtls_pk_parse_keyfile()</li> + <li>mbedtls_ecp_check_pub_priv() and mbedtls_pk_check_pair()</li> + </ol> + <p>When those functions are called, scalar multiplication is computed + without randomisation, a number of old and new attacks apply, + allowing a powerful local attacker to fully recover the private + key.</p> + </blockquote> + </body> + </description> + <references> + <url>https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07</url> + </references> + <dates> + <discovery>2020-07-01</discovery> + <entry>2020-07-07</entry> + </dates> + </vuln> + <vuln vid="f7a97d43-c039-11ea-a051-001b217b3468"> <topic>Gitlab -- Multiple Vulnerabilities</topic> <affects> |