Mageia 2020-0053: mbedtls security update
Summary
This update from mbedTLS 2.16.2 to mbedTLS 2.16.4 fixes several security
vulnerabilities, among which:
The deterministic ECDSA calculation reused the scheme's HMAC-DRBG to
implement blinding. Because of this for the same key and message the
same blinding value was generated. This reduced the effectiveness of the
countermeasure and leaked information about the private key through side
channels (CVE-2019-16910).
Fix side channel vulnerability in ECDSA. Our bignum implementation is not
constant time/constant trace, so side channel attacks can retrieve the blinded
value, factor it (as it is smaller than RSA keys and not guaranteed to have
only large prime factors), and then, by brute force, recover the key
(CVE-2019-18222).
See release notes for details.
References
- https://bugs.mageia.org/show_bug.cgi?id=25952
- https://www.trustedfirmware.org/projects/mbed-tls/
- https://www.trustedfirmware.org/projects/mbed-tls/
- - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16910
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18222
Resolution
MGASA-2020-0053 - Updated mbedtls packages fix security vulnerabilities
SRPMS
- 7/core/mbedtls-2.16.4-1.mga7