Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-14032 (GCVE-0-2017-14032)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:13:41.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-3967", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3967" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/873557" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-07T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-3967", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3967" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/873557" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-3967", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3967" }, { "name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02", "refsource": "CONFIRM", "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02" }, { "name": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32", "refsource": "CONFIRM", "url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32" }, { "name": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc", "refsource": "CONFIRM", "url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc" }, { "name": "https://bugs.debian.org/873557", "refsource": "CONFIRM", "url": "https://bugs.debian.org/873557" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-14032", "datePublished": "2017-08-30T20:00:00", "dateReserved": "2017-08-30T00:00:00", "dateUpdated": "2024-08-05T19:13:41.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-14032\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-08-30T20:29:00.337\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.\"},{\"lang\":\"es\",\"value\":\"ARM mbed TLS en versiones anteriores a la 1.3.21 y en versiones 2.x anteriores a la 2.1.9, si se configura la autenticaci\u00f3n opcional, permite a los atacantes omitir la autenticaci\u00f3n Peer mediante una cadena de certificados X.509 con muchos intermediarios. NOTA: aunque mbed TLS se conoc\u00eda antes como PolarSSL, las versiones lanzadas con el nombre PolarSSL no est\u00e1n afectadas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28621156-2430-447B-8816-47B0FB58245B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11BBB2C-0423-47B1-AE12-EB849E17BAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4131CE76-6260-412C-A6A6-20B0E978E569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE92D8F7-5705-47B6-B2C2-9DE6C7880647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA50C256-2054-4661-9C42-D31D7D87BAF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7791D4E9-3FEE-42DA-B320-CF7188A10294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE415DAA-A89F-4204-AC2C-577FCB447E4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95F691DB-9552-4EBB-B29D-16658561FA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1547B2A-E0D5-41D1-9449-1CCF35022B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF762122-64BC-4A1A-A26D-81C1270541A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59D6B559-5F99-4E38-A861-3AB8A7D2E6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A8956C8-6CF0-4C37-84F9-8A89726806C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B395D81-876F-43FC-8DB9-44377647A37A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F92622F1-82DA-4819-8275-06DC9DBE1BA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5871FDE9-02D0-466C-BDB7-90A14C4F637E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE6B4875-3FC3-499F-A76B-2D04982F743A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B67842-5AFA-459F-9CCF-772B9DC7139F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD0500EE-52C0-4896-B3D8-5BE731D66039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015739E9-C0E3-4A62-BB9D-FA836BFD4351\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"842B0D15-6A3D-4CEE-AD02-49B0436E78E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF6E05C-E6E5-40B8-AFEA-A5ED937F5439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4133C86-70E0-44FD-BBDB-D61EFB31F027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F9D24F0-3892-417F-9C3A-CACEF00C2293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8911513E-968C-403E-9D00-2DC0AA82F99B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48D98945-82BB-4954-AA6D-7D98E4CE1154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6378C1CC-7C8F-47E3-A1A7-CDEC76E4CBE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"525190A3-2194-4E4E-9D34-0048583B9C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70407352-624A-40E6-82E4-7B4FAFE0C0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD52988E-4B2F-41AF-BC25-F38F87D9B8C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1F7803-31F3-40A9-A878-FDC757FCE83F\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3967\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.debian.org/873557\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3967\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.debian.org/873557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-6v28-r64j-r4w6
Vulnerability from github
ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.
{ "affected": [], "aliases": [ "CVE-2017-14032" ], "database_specific": { "cwe_ids": [ "CWE-287" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-08-30T20:29:00Z", "severity": "HIGH" }, "details": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.", "id": "GHSA-6v28-r64j-r4w6", "modified": "2022-05-17T00:25:45Z", "published": "2022-05-17T00:25:45Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14032" }, { "type": "WEB", "url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32" }, { "type": "WEB", "url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc" }, { "type": "WEB", "url": "https://bugs.debian.org/873557" }, { "type": "WEB", "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3967" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cnvd-2017-30841
Vulnerability from cnvd
Title: ARM mbed TLS验证绕过漏洞
Description:
ARM mbed TLS是一款为mbed产品提供安全通讯和加密功能的产品。
ARM mbed TLS存在安全漏洞,允许远程攻击者利用漏洞提交特制的请求,绕过身份验证,未授权访问。
Severity: 中
Patch Name: ARM mbed TLS验证绕过漏洞的补丁
Patch Description:
ARM mbed TLS是一款为mbed产品提供安全通讯和加密功能的产品。
ARM mbed TLS存在安全漏洞,允许远程攻击者利用漏洞提交特制的请求,绕过身份验证,未授权访问。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02
Reference: https://bugs.debian.org/873557
Name | ['ARM mbed TLS <1.3.21', 'ARM mbed TLS 2.*,<2.1.9'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2017-14032" } }, "description": "ARM mbed TLS\u662f\u4e00\u6b3e\u4e3ambed\u4ea7\u54c1\u63d0\u4f9b\u5b89\u5168\u901a\u8baf\u548c\u52a0\u5bc6\u529f\u80fd\u7684\u4ea7\u54c1\u3002\r\n\r\nARM mbed TLS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u5236\u7684\u8bf7\u6c42\uff0c\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\uff0c\u672a\u6388\u6743\u8bbf\u95ee\u3002", "discovererName": "mpg", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-30841", "openTime": "2017-10-20", "patchDescription": "ARM mbed TLS\u662f\u4e00\u6b3e\u4e3ambed\u4ea7\u54c1\u63d0\u4f9b\u5b89\u5168\u901a\u8baf\u548c\u52a0\u5bc6\u529f\u80fd\u7684\u4ea7\u54c1\u3002\r\n\r\nARM mbed TLS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u5236\u7684\u8bf7\u6c42\uff0c\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\uff0c\u672a\u6388\u6743\u8bbf\u95ee\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "ARM mbed TLS\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "ARM mbed TLS \u003c1.3.21", "ARM mbed TLS 2.*\uff0c\u003c2.1.9" ] }, "referenceLink": "https://bugs.debian.org/873557", "serverity": "\u4e2d", "submitTime": "2017-09-01", "title": "ARM mbed TLS\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e" }
gsd-2017-14032
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-14032", "description": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.", "id": "GSD-2017-14032", "references": [ "https://www.suse.com/security/cve/CVE-2017-14032.html", "https://www.debian.org/security/2017/dsa-3967", "https://advisories.mageia.org/CVE-2017-14032.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-14032" ], "details": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.", "id": "GSD-2017-14032", "modified": "2023-12-13T01:21:12.676081Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-3967", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3967" }, { "name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02", "refsource": "CONFIRM", "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02" }, { "name": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32", "refsource": "CONFIRM", "url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32" }, { "name": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc", "refsource": "CONFIRM", "url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc" }, { "name": "https://bugs.debian.org/873557", "refsource": "CONFIRM", "url": "https://bugs.debian.org/873557" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14032" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02" }, { "name": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc" }, { "name": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32" }, { "name": "https://bugs.debian.org/873557", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/873557" }, { "name": "DSA-3967", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2017/dsa-3967" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9 } }, "lastModifiedDate": "2017-11-08T02:29Z", "publishedDate": "2017-08-30T20:29Z" } } }
opensuse-su-2017:2731-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for mbedtls", "title": "Title of the patch" }, { "category": "description", "text": "This update for mbedtls fixes the following issues:\n\n- CVE-2017-14032: Possible authentication bypass of peer based authentication when auth mode is configured as \u0027optional\u0027 (boo#1056544).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2017-1156", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_2731-1.json" }, { "category": "self", "summary": "SUSE Bug 1056544", "url": "https://bugzilla.suse.com/1056544" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14032 page", "url": "https://www.suse.com/security/cve/CVE-2017-14032/" } ], "title": "Security update for mbedtls", "tracking": { "current_release_date": "2017-10-16T18:55:23Z", "generator": { "date": "2017-10-16T18:55:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2017:2731-1", "initial_release_date": "2017-10-16T18:55:23Z", "revision_history": [ { "date": "2017-10-16T18:55:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libmbedtls9-1.3.19-8.1.aarch64", "product": { "name": "libmbedtls9-1.3.19-8.1.aarch64", "product_id": "libmbedtls9-1.3.19-8.1.aarch64" } }, { "category": "product_version", "name": "mbedtls-devel-1.3.19-8.1.aarch64", "product": { "name": "mbedtls-devel-1.3.19-8.1.aarch64", "product_id": "mbedtls-devel-1.3.19-8.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libmbedtls9-1.3.19-8.1.ppc64le", "product": { "name": "libmbedtls9-1.3.19-8.1.ppc64le", "product_id": "libmbedtls9-1.3.19-8.1.ppc64le" } }, { "category": "product_version", "name": "mbedtls-devel-1.3.19-8.1.ppc64le", "product": { "name": "mbedtls-devel-1.3.19-8.1.ppc64le", "product_id": "mbedtls-devel-1.3.19-8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libmbedtls9-1.3.19-8.1.s390x", "product": { "name": "libmbedtls9-1.3.19-8.1.s390x", "product_id": "libmbedtls9-1.3.19-8.1.s390x" } }, { "category": "product_version", "name": "mbedtls-devel-1.3.19-8.1.s390x", "product": { "name": "mbedtls-devel-1.3.19-8.1.s390x", "product_id": "mbedtls-devel-1.3.19-8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libmbedtls9-1.3.19-8.1.x86_64", "product": { "name": "libmbedtls9-1.3.19-8.1.x86_64", "product_id": "libmbedtls9-1.3.19-8.1.x86_64" } }, { "category": "product_version", "name": "mbedtls-devel-1.3.19-8.1.x86_64", "product": { "name": "mbedtls-devel-1.3.19-8.1.x86_64", "product_id": "mbedtls-devel-1.3.19-8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libmbedtls9-1.3.19-8.1.aarch64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64" }, "product_reference": "libmbedtls9-1.3.19-8.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls9-1.3.19-8.1.ppc64le as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le" }, "product_reference": "libmbedtls9-1.3.19-8.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls9-1.3.19-8.1.s390x as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x" }, "product_reference": "libmbedtls9-1.3.19-8.1.s390x", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls9-1.3.19-8.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64" }, "product_reference": "libmbedtls9-1.3.19-8.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-1.3.19-8.1.aarch64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64" }, "product_reference": "mbedtls-devel-1.3.19-8.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-1.3.19-8.1.ppc64le as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le" }, "product_reference": "mbedtls-devel-1.3.19-8.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-1.3.19-8.1.s390x as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x" }, "product_reference": "mbedtls-devel-1.3.19-8.1.s390x", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-1.3.19-8.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64" }, "product_reference": "mbedtls-devel-1.3.19-8.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14032" } ], "notes": [ { "category": "general", "text": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14032", "url": "https://www.suse.com/security/cve/CVE-2017-14032" }, { "category": "external", "summary": "SUSE Bug 1056544 for CVE-2017-14032", "url": "https://bugzilla.suse.com/1056544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-16T18:55:23Z", "details": "important" } ], "title": "CVE-2017-14032" } ] }
opensuse-su-2024:11043-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libmbedcrypto7-2.27.0-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libmbedcrypto7-2.27.0-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11043", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11043-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14032 page", "url": "https://www.suse.com/security/cve/CVE-2017-14032/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2784 page", "url": "https://www.suse.com/security/cve/CVE-2017-2784/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0487 page", "url": "https://www.suse.com/security/cve/CVE-2018-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0488 page", "url": "https://www.suse.com/security/cve/CVE-2018-0488/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19608 page", "url": "https://www.suse.com/security/cve/CVE-2018-19608/" } ], "title": "libmbedcrypto7-2.27.0-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11043-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libmbedcrypto7-2.27.0-1.2.aarch64", "product": { "name": "libmbedcrypto7-2.27.0-1.2.aarch64", "product_id": "libmbedcrypto7-2.27.0-1.2.aarch64" } }, { "category": "product_version", "name": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "product": { "name": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "product_id": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64" } }, { "category": "product_version", "name": "libmbedtls13-2.27.0-1.2.aarch64", "product": { "name": "libmbedtls13-2.27.0-1.2.aarch64", "product_id": "libmbedtls13-2.27.0-1.2.aarch64" } }, { "category": "product_version", "name": "libmbedtls13-32bit-2.27.0-1.2.aarch64", "product": { "name": "libmbedtls13-32bit-2.27.0-1.2.aarch64", "product_id": "libmbedtls13-32bit-2.27.0-1.2.aarch64" } }, { "category": "product_version", "name": "libmbedx509-1-2.27.0-1.2.aarch64", "product": { "name": "libmbedx509-1-2.27.0-1.2.aarch64", "product_id": "libmbedx509-1-2.27.0-1.2.aarch64" } }, { "category": "product_version", "name": "libmbedx509-1-32bit-2.27.0-1.2.aarch64", "product": { "name": "libmbedx509-1-32bit-2.27.0-1.2.aarch64", "product_id": "libmbedx509-1-32bit-2.27.0-1.2.aarch64" } }, { "category": "product_version", "name": "mbedtls-devel-2.27.0-1.2.aarch64", "product": { "name": "mbedtls-devel-2.27.0-1.2.aarch64", "product_id": "mbedtls-devel-2.27.0-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libmbedcrypto7-2.27.0-1.2.ppc64le", "product": { "name": "libmbedcrypto7-2.27.0-1.2.ppc64le", "product_id": "libmbedcrypto7-2.27.0-1.2.ppc64le" } }, { "category": "product_version", "name": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "product": { "name": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "product_id": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le" } }, { "category": "product_version", "name": "libmbedtls13-2.27.0-1.2.ppc64le", "product": { "name": "libmbedtls13-2.27.0-1.2.ppc64le", "product_id": "libmbedtls13-2.27.0-1.2.ppc64le" } }, { "category": "product_version", "name": "libmbedtls13-32bit-2.27.0-1.2.ppc64le", "product": { "name": "libmbedtls13-32bit-2.27.0-1.2.ppc64le", "product_id": "libmbedtls13-32bit-2.27.0-1.2.ppc64le" } }, { "category": "product_version", "name": "libmbedx509-1-2.27.0-1.2.ppc64le", "product": { "name": "libmbedx509-1-2.27.0-1.2.ppc64le", "product_id": "libmbedx509-1-2.27.0-1.2.ppc64le" } }, { "category": "product_version", "name": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "product": { "name": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "product_id": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le" } }, { "category": "product_version", "name": "mbedtls-devel-2.27.0-1.2.ppc64le", "product": { "name": "mbedtls-devel-2.27.0-1.2.ppc64le", "product_id": "mbedtls-devel-2.27.0-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libmbedcrypto7-2.27.0-1.2.s390x", "product": { "name": "libmbedcrypto7-2.27.0-1.2.s390x", "product_id": "libmbedcrypto7-2.27.0-1.2.s390x" } }, { "category": "product_version", "name": "libmbedcrypto7-32bit-2.27.0-1.2.s390x", "product": { "name": "libmbedcrypto7-32bit-2.27.0-1.2.s390x", "product_id": "libmbedcrypto7-32bit-2.27.0-1.2.s390x" } }, { "category": "product_version", "name": "libmbedtls13-2.27.0-1.2.s390x", "product": { "name": "libmbedtls13-2.27.0-1.2.s390x", "product_id": "libmbedtls13-2.27.0-1.2.s390x" } }, { "category": "product_version", "name": "libmbedtls13-32bit-2.27.0-1.2.s390x", "product": { "name": "libmbedtls13-32bit-2.27.0-1.2.s390x", "product_id": "libmbedtls13-32bit-2.27.0-1.2.s390x" } }, { "category": "product_version", "name": "libmbedx509-1-2.27.0-1.2.s390x", "product": { "name": "libmbedx509-1-2.27.0-1.2.s390x", "product_id": "libmbedx509-1-2.27.0-1.2.s390x" } }, { "category": "product_version", "name": "libmbedx509-1-32bit-2.27.0-1.2.s390x", "product": { "name": "libmbedx509-1-32bit-2.27.0-1.2.s390x", "product_id": "libmbedx509-1-32bit-2.27.0-1.2.s390x" } }, { "category": "product_version", "name": "mbedtls-devel-2.27.0-1.2.s390x", "product": { "name": "mbedtls-devel-2.27.0-1.2.s390x", "product_id": "mbedtls-devel-2.27.0-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libmbedcrypto7-2.27.0-1.2.x86_64", "product": { "name": "libmbedcrypto7-2.27.0-1.2.x86_64", "product_id": "libmbedcrypto7-2.27.0-1.2.x86_64" } }, { "category": "product_version", "name": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "product": { "name": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "product_id": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64" } }, { "category": "product_version", "name": "libmbedtls13-2.27.0-1.2.x86_64", "product": { "name": "libmbedtls13-2.27.0-1.2.x86_64", "product_id": "libmbedtls13-2.27.0-1.2.x86_64" } }, { "category": "product_version", "name": "libmbedtls13-32bit-2.27.0-1.2.x86_64", "product": { "name": "libmbedtls13-32bit-2.27.0-1.2.x86_64", "product_id": "libmbedtls13-32bit-2.27.0-1.2.x86_64" } }, { "category": "product_version", "name": "libmbedx509-1-2.27.0-1.2.x86_64", "product": { "name": "libmbedx509-1-2.27.0-1.2.x86_64", "product_id": "libmbedx509-1-2.27.0-1.2.x86_64" } }, { "category": "product_version", "name": "libmbedx509-1-32bit-2.27.0-1.2.x86_64", "product": { "name": "libmbedx509-1-32bit-2.27.0-1.2.x86_64", "product_id": "libmbedx509-1-32bit-2.27.0-1.2.x86_64" } }, { "category": "product_version", "name": "mbedtls-devel-2.27.0-1.2.x86_64", "product": { "name": "mbedtls-devel-2.27.0-1.2.x86_64", "product_id": "mbedtls-devel-2.27.0-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libmbedcrypto7-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64" }, "product_reference": "libmbedcrypto7-2.27.0-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedcrypto7-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le" }, "product_reference": "libmbedcrypto7-2.27.0-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedcrypto7-2.27.0-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x" }, "product_reference": "libmbedcrypto7-2.27.0-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedcrypto7-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64" }, "product_reference": "libmbedcrypto7-2.27.0-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64" }, "product_reference": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le" }, "product_reference": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedcrypto7-32bit-2.27.0-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x" }, "product_reference": "libmbedcrypto7-32bit-2.27.0-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64" }, "product_reference": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls13-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64" }, "product_reference": "libmbedtls13-2.27.0-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls13-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le" }, "product_reference": "libmbedtls13-2.27.0-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls13-2.27.0-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x" }, "product_reference": "libmbedtls13-2.27.0-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls13-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64" }, "product_reference": "libmbedtls13-2.27.0-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls13-32bit-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64" }, "product_reference": "libmbedtls13-32bit-2.27.0-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls13-32bit-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le" }, "product_reference": "libmbedtls13-32bit-2.27.0-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls13-32bit-2.27.0-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x" }, "product_reference": "libmbedtls13-32bit-2.27.0-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls13-32bit-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64" }, "product_reference": "libmbedtls13-32bit-2.27.0-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedx509-1-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64" }, "product_reference": "libmbedx509-1-2.27.0-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedx509-1-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le" }, "product_reference": "libmbedx509-1-2.27.0-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedx509-1-2.27.0-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x" }, "product_reference": "libmbedx509-1-2.27.0-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedx509-1-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64" }, "product_reference": "libmbedx509-1-2.27.0-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedx509-1-32bit-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64" }, "product_reference": "libmbedx509-1-32bit-2.27.0-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le" }, "product_reference": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedx509-1-32bit-2.27.0-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x" }, "product_reference": "libmbedx509-1-32bit-2.27.0-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedx509-1-32bit-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64" }, "product_reference": "libmbedx509-1-32bit-2.27.0-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64" }, "product_reference": "mbedtls-devel-2.27.0-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le" }, "product_reference": "mbedtls-devel-2.27.0-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-2.27.0-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x" }, "product_reference": "mbedtls-devel-2.27.0-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" }, "product_reference": "mbedtls-devel-2.27.0-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14032" } ], "notes": [ { "category": "general", "text": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14032", "url": "https://www.suse.com/security/cve/CVE-2017-14032" }, { "category": "external", "summary": "SUSE Bug 1056544 for CVE-2017-14032", "url": "https://bugzilla.suse.com/1056544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-14032" }, { "cve": "CVE-2017-2784", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2784" } ], "notes": [ { "category": "general", "text": "An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2784", "url": "https://www.suse.com/security/cve/CVE-2017-2784" }, { "category": "external", "summary": "SUSE Bug 1029017 for CVE-2017-2784", "url": "https://bugzilla.suse.com/1029017" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-2784" }, { "cve": "CVE-2018-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0487" } ], "notes": [ { "category": "general", "text": "ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0487", "url": "https://www.suse.com/security/cve/CVE-2018-0487" }, { "category": "external", "summary": "SUSE Bug 1080826 for CVE-2018-0487", "url": "https://bugzilla.suse.com/1080826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-0487" }, { "cve": "CVE-2018-0488", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0488" } ], "notes": [ { "category": "general", "text": "ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0, when the truncated HMAC extension and CBC are used, allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0488", "url": "https://www.suse.com/security/cve/CVE-2018-0488" }, { "category": "external", "summary": "SUSE Bug 1080828 for CVE-2018-0488", "url": "https://bugzilla.suse.com/1080828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-0488" }, { "cve": "CVE-2018-19608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19608" } ], "notes": [ { "category": "general", "text": "Arm Mbed TLS before 2.14.1, before 2.7.8, and before 2.1.17 allows a local unprivileged attacker to recover the plaintext of RSA decryption, which is used in RSA-without-(EC)DH(E) cipher suites.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19608", "url": "https://www.suse.com/security/cve/CVE-2018-19608" }, { "category": "external", "summary": "SUSE Bug 1118727 for CVE-2018-19608", "url": "https://bugzilla.suse.com/1118727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x", "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x", "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19608" } ] }
opensuse-su-2017:2736-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for mbedtls", "title": "Title of the patch" }, { "category": "description", "text": "This update for mbedtls fixes the following issues:\n\n- CVE-2017-14032: Possible authentication bypass of peer based authentication when auth mode is configured as \u0027optional\u0027 (boo#1056544).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2017-1156", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_2736-1.json" }, { "category": "self", "summary": "SUSE Bug 1056544", "url": "https://bugzilla.suse.com/1056544" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14032 page", "url": "https://www.suse.com/security/cve/CVE-2017-14032/" } ], "title": "Security update for mbedtls", "tracking": { "current_release_date": "2017-10-16T18:55:23Z", "generator": { "date": "2017-10-16T18:55:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2017:2736-1", "initial_release_date": "2017-10-16T18:55:23Z", "revision_history": [ { "date": "2017-10-16T18:55:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libmbedtls9-1.3.19-8.1.aarch64", "product": { "name": "libmbedtls9-1.3.19-8.1.aarch64", "product_id": "libmbedtls9-1.3.19-8.1.aarch64" } }, { "category": "product_version", "name": "mbedtls-devel-1.3.19-8.1.aarch64", "product": { "name": "mbedtls-devel-1.3.19-8.1.aarch64", "product_id": "mbedtls-devel-1.3.19-8.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libmbedtls9-1.3.19-8.1.ppc64le", "product": { "name": "libmbedtls9-1.3.19-8.1.ppc64le", "product_id": "libmbedtls9-1.3.19-8.1.ppc64le" } }, { "category": "product_version", "name": "mbedtls-devel-1.3.19-8.1.ppc64le", "product": { "name": "mbedtls-devel-1.3.19-8.1.ppc64le", "product_id": "mbedtls-devel-1.3.19-8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libmbedtls9-1.3.19-8.1.s390x", "product": { "name": "libmbedtls9-1.3.19-8.1.s390x", "product_id": "libmbedtls9-1.3.19-8.1.s390x" } }, { "category": "product_version", "name": "mbedtls-devel-1.3.19-8.1.s390x", "product": { "name": "mbedtls-devel-1.3.19-8.1.s390x", "product_id": "mbedtls-devel-1.3.19-8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libmbedtls9-1.3.19-8.1.x86_64", "product": { "name": "libmbedtls9-1.3.19-8.1.x86_64", "product_id": "libmbedtls9-1.3.19-8.1.x86_64" } }, { "category": "product_version", "name": "mbedtls-devel-1.3.19-8.1.x86_64", "product": { "name": "mbedtls-devel-1.3.19-8.1.x86_64", "product_id": "mbedtls-devel-1.3.19-8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libmbedtls9-1.3.19-8.1.aarch64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64" }, "product_reference": "libmbedtls9-1.3.19-8.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls9-1.3.19-8.1.ppc64le as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le" }, "product_reference": "libmbedtls9-1.3.19-8.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls9-1.3.19-8.1.s390x as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x" }, "product_reference": "libmbedtls9-1.3.19-8.1.s390x", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "libmbedtls9-1.3.19-8.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64" }, "product_reference": "libmbedtls9-1.3.19-8.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-1.3.19-8.1.aarch64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64" }, "product_reference": "mbedtls-devel-1.3.19-8.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-1.3.19-8.1.ppc64le as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le" }, "product_reference": "mbedtls-devel-1.3.19-8.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-1.3.19-8.1.s390x as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x" }, "product_reference": "mbedtls-devel-1.3.19-8.1.s390x", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "mbedtls-devel-1.3.19-8.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64" }, "product_reference": "mbedtls-devel-1.3.19-8.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14032" } ], "notes": [ { "category": "general", "text": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14032", "url": "https://www.suse.com/security/cve/CVE-2017-14032" }, { "category": "external", "summary": "SUSE Bug 1056544 for CVE-2017-14032", "url": "https://bugzilla.suse.com/1056544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x", "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x", "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-16T18:55:23Z", "details": "important" } ], "title": "CVE-2017-14032" } ] }
fkie_cve-2017-14032
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
arm | mbed_tls | 1.3.10 | |
arm | mbed_tls | 1.3.11 | |
arm | mbed_tls | 1.3.12 | |
arm | mbed_tls | 1.3.13 | |
arm | mbed_tls | 1.3.14 | |
arm | mbed_tls | 1.3.15 | |
arm | mbed_tls | 1.3.16 | |
arm | mbed_tls | 1.3.17 | |
arm | mbed_tls | 1.3.18 | |
arm | mbed_tls | 1.3.19 | |
arm | mbed_tls | 1.3.20 | |
arm | mbed_tls | 1.3.21 | |
arm | mbed_tls | 2.0.0 | |
arm | mbed_tls | 2.1.0 | |
arm | mbed_tls | 2.1.1 | |
arm | mbed_tls | 2.1.2 | |
arm | mbed_tls | 2.1.3 | |
arm | mbed_tls | 2.1.4 | |
arm | mbed_tls | 2.1.5 | |
arm | mbed_tls | 2.1.6 | |
arm | mbed_tls | 2.1.7 | |
arm | mbed_tls | 2.1.8 | |
arm | mbed_tls | 2.1.9 | |
arm | mbed_tls | 2.2.0 | |
arm | mbed_tls | 2.2.1 | |
arm | mbed_tls | 2.3.0 | |
arm | mbed_tls | 2.4.0 | |
arm | mbed_tls | 2.4.2 | |
arm | mbed_tls | 2.5.1 | |
arm | mbed_tls | 2.6.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "28621156-2430-447B-8816-47B0FB58245B", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "E11BBB2C-0423-47B1-AE12-EB849E17BAF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "4131CE76-6260-412C-A6A6-20B0E978E569", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "DE92D8F7-5705-47B6-B2C2-9DE6C7880647", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "EA50C256-2054-4661-9C42-D31D7D87BAF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "7791D4E9-3FEE-42DA-B320-CF7188A10294", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "BE415DAA-A89F-4204-AC2C-577FCB447E4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "95F691DB-9552-4EBB-B29D-16658561FA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "F1547B2A-E0D5-41D1-9449-1CCF35022B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "CF762122-64BC-4A1A-A26D-81C1270541A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "59D6B559-5F99-4E38-A861-3AB8A7D2E6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:1.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A8956C8-6CF0-4C37-84F9-8A89726806C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B395D81-876F-43FC-8DB9-44377647A37A", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F92622F1-82DA-4819-8275-06DC9DBE1BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5871FDE9-02D0-466C-BDB7-90A14C4F637E", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FE6B4875-3FC3-499F-A76B-2D04982F743A", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3B67842-5AFA-459F-9CCF-772B9DC7139F", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "AD0500EE-52C0-4896-B3D8-5BE731D66039", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "015739E9-C0E3-4A62-BB9D-FA836BFD4351", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "842B0D15-6A3D-4CEE-AD02-49B0436E78E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3CF6E05C-E6E5-40B8-AFEA-A5ED937F5439", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "D4133C86-70E0-44FD-BBDB-D61EFB31F027", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "6F9D24F0-3892-417F-9C3A-CACEF00C2293", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8911513E-968C-403E-9D00-2DC0AA82F99B", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48D98945-82BB-4954-AA6D-7D98E4CE1154", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6378C1CC-7C8F-47E3-A1A7-CDEC76E4CBE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "525190A3-2194-4E4E-9D34-0048583B9C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "70407352-624A-40E6-82E4-7B4FAFE0C0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD52988E-4B2F-41AF-BC25-F38F87D9B8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD1F7803-31F3-40A9-A878-FDC757FCE83F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected." }, { "lang": "es", "value": "ARM mbed TLS en versiones anteriores a la 1.3.21 y en versiones 2.x anteriores a la 2.1.9, si se configura la autenticaci\u00f3n opcional, permite a los atacantes omitir la autenticaci\u00f3n Peer mediante una cadena de certificados X.509 con muchos intermediarios. NOTA: aunque mbed TLS se conoc\u00eda antes como PolarSSL, las versiones lanzadas con el nombre PolarSSL no est\u00e1n afectadas." } ], "id": "CVE-2017-14032", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-30T20:29:00.337", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2017/dsa-3967" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/873557" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.debian.org/873557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.