Bug ID | 1103597 |
---|---|
Summary | VUL-0: CVE-2018-0498, CVE-2018-0497: mbedtls: Two plaintext recovery issues |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 42.3 |
Hardware | Other |
URL | https://smash.suse.de/issue/212136/ |
OS | Other |
Status | NEW |
Severity | Critical |
Priority | P5 - None |
Component | Security |
Assignee | mpluskal@suse.com |
Reporter | jsegitz@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
rh#1611638 CVE-2018-0497 ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169. CVE-2018-0498 ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows local users to achieve partial plaintext recovery (for a CBC based ciphersuite) via a cache-based side-channel attack. References: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02 https://bugzilla.redhat.com/show_bug.cgi?id=1611638