Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-14032 (GCVE-0-2017-14032)
Vulnerability from cvelistv5 – Published: 2017-08-30 20:00 – Updated: 2024-08-05 19:13
VLAI?
EPSS
Summary
ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T19:13:41.938Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-3967",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2017/dsa-3967"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.debian.org/873557"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-08-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-11-07T10:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "DSA-3967",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2017/dsa-3967"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.debian.org/873557"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-14032",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-3967",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3967"
},
{
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02",
"refsource": "CONFIRM",
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02"
},
{
"name": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32",
"refsource": "CONFIRM",
"url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32"
},
{
"name": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc",
"refsource": "CONFIRM",
"url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc"
},
{
"name": "https://bugs.debian.org/873557",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/873557"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-14032",
"datePublished": "2017-08-30T20:00:00",
"dateReserved": "2017-08-30T00:00:00",
"dateUpdated": "2024-08-05T19:13:41.938Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-14032\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-08-30T20:29:00.337\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.\"},{\"lang\":\"es\",\"value\":\"ARM mbed TLS en versiones anteriores a la 1.3.21 y en versiones 2.x anteriores a la 2.1.9, si se configura la autenticaci\u00f3n opcional, permite a los atacantes omitir la autenticaci\u00f3n Peer mediante una cadena de certificados X.509 con muchos intermediarios. NOTA: aunque mbed TLS se conoc\u00eda antes como PolarSSL, las versiones lanzadas con el nombre PolarSSL no est\u00e1n afectadas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28621156-2430-447B-8816-47B0FB58245B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11BBB2C-0423-47B1-AE12-EB849E17BAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4131CE76-6260-412C-A6A6-20B0E978E569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE92D8F7-5705-47B6-B2C2-9DE6C7880647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA50C256-2054-4661-9C42-D31D7D87BAF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7791D4E9-3FEE-42DA-B320-CF7188A10294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE415DAA-A89F-4204-AC2C-577FCB447E4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95F691DB-9552-4EBB-B29D-16658561FA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1547B2A-E0D5-41D1-9449-1CCF35022B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF762122-64BC-4A1A-A26D-81C1270541A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59D6B559-5F99-4E38-A861-3AB8A7D2E6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:1.3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A8956C8-6CF0-4C37-84F9-8A89726806C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B395D81-876F-43FC-8DB9-44377647A37A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F92622F1-82DA-4819-8275-06DC9DBE1BA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5871FDE9-02D0-466C-BDB7-90A14C4F637E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE6B4875-3FC3-499F-A76B-2D04982F743A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B67842-5AFA-459F-9CCF-772B9DC7139F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD0500EE-52C0-4896-B3D8-5BE731D66039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015739E9-C0E3-4A62-BB9D-FA836BFD4351\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"842B0D15-6A3D-4CEE-AD02-49B0436E78E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF6E05C-E6E5-40B8-AFEA-A5ED937F5439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4133C86-70E0-44FD-BBDB-D61EFB31F027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F9D24F0-3892-417F-9C3A-CACEF00C2293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8911513E-968C-403E-9D00-2DC0AA82F99B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48D98945-82BB-4954-AA6D-7D98E4CE1154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6378C1CC-7C8F-47E3-A1A7-CDEC76E4CBE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"525190A3-2194-4E4E-9D34-0048583B9C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70407352-624A-40E6-82E4-7B4FAFE0C0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD52988E-4B2F-41AF-BC25-F38F87D9B8C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1F7803-31F3-40A9-A878-FDC757FCE83F\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3967\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.debian.org/873557\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3967\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.debian.org/873557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CNVD-2017-30841
Vulnerability from cnvd - Published: 2017-10-20
VLAI Severity ?
Title
ARM mbed TLS验证绕过漏洞
Description
ARM mbed TLS是一款为mbed产品提供安全通讯和加密功能的产品。
ARM mbed TLS存在安全漏洞,允许远程攻击者利用漏洞提交特制的请求,绕过身份验证,未授权访问。
Severity
中
Patch Name
ARM mbed TLS验证绕过漏洞的补丁
Patch Description
ARM mbed TLS是一款为mbed产品提供安全通讯和加密功能的产品。
ARM mbed TLS存在安全漏洞,允许远程攻击者利用漏洞提交特制的请求,绕过身份验证,未授权访问。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02
Reference
https://bugs.debian.org/873557
Impacted products
| Name | ['ARM mbed TLS <1.3.21', 'ARM mbed TLS 2.*,<2.1.9'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-14032"
}
},
"description": "ARM mbed TLS\u662f\u4e00\u6b3e\u4e3ambed\u4ea7\u54c1\u63d0\u4f9b\u5b89\u5168\u901a\u8baf\u548c\u52a0\u5bc6\u529f\u80fd\u7684\u4ea7\u54c1\u3002\r\n\r\nARM mbed TLS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u5236\u7684\u8bf7\u6c42\uff0c\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\uff0c\u672a\u6388\u6743\u8bbf\u95ee\u3002",
"discovererName": "mpg",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-30841",
"openTime": "2017-10-20",
"patchDescription": "ARM mbed TLS\u662f\u4e00\u6b3e\u4e3ambed\u4ea7\u54c1\u63d0\u4f9b\u5b89\u5168\u901a\u8baf\u548c\u52a0\u5bc6\u529f\u80fd\u7684\u4ea7\u54c1\u3002\r\n\r\nARM mbed TLS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u5236\u7684\u8bf7\u6c42\uff0c\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\uff0c\u672a\u6388\u6743\u8bbf\u95ee\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "ARM mbed TLS\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"ARM mbed TLS \u003c1.3.21",
"ARM mbed TLS 2.*\uff0c\u003c2.1.9"
]
},
"referenceLink": "https://bugs.debian.org/873557",
"serverity": "\u4e2d",
"submitTime": "2017-09-01",
"title": "ARM mbed TLS\u9a8c\u8bc1\u7ed5\u8fc7\u6f0f\u6d1e"
}
OPENSUSE-SU-2024:11043-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
libmbedcrypto7-2.27.0-1.2 on GA media
Notes
Title of the patch
libmbedcrypto7-2.27.0-1.2 on GA media
Description of the patch
These are all security issues fixed in the libmbedcrypto7-2.27.0-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11043
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libmbedcrypto7-2.27.0-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libmbedcrypto7-2.27.0-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11043",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11043-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14032 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2784 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0487 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0488 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0488/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19608 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19608/"
}
],
"title": "libmbedcrypto7-2.27.0-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11043-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libmbedcrypto7-2.27.0-1.2.aarch64",
"product": {
"name": "libmbedcrypto7-2.27.0-1.2.aarch64",
"product_id": "libmbedcrypto7-2.27.0-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"product": {
"name": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"product_id": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedtls13-2.27.0-1.2.aarch64",
"product": {
"name": "libmbedtls13-2.27.0-1.2.aarch64",
"product_id": "libmbedtls13-2.27.0-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedtls13-32bit-2.27.0-1.2.aarch64",
"product": {
"name": "libmbedtls13-32bit-2.27.0-1.2.aarch64",
"product_id": "libmbedtls13-32bit-2.27.0-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-2.27.0-1.2.aarch64",
"product": {
"name": "libmbedx509-1-2.27.0-1.2.aarch64",
"product_id": "libmbedx509-1-2.27.0-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"product": {
"name": "libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"product_id": "libmbedx509-1-32bit-2.27.0-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-2.27.0-1.2.aarch64",
"product": {
"name": "mbedtls-devel-2.27.0-1.2.aarch64",
"product_id": "mbedtls-devel-2.27.0-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedcrypto7-2.27.0-1.2.ppc64le",
"product": {
"name": "libmbedcrypto7-2.27.0-1.2.ppc64le",
"product_id": "libmbedcrypto7-2.27.0-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"product": {
"name": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"product_id": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedtls13-2.27.0-1.2.ppc64le",
"product": {
"name": "libmbedtls13-2.27.0-1.2.ppc64le",
"product_id": "libmbedtls13-2.27.0-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"product": {
"name": "libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"product_id": "libmbedtls13-32bit-2.27.0-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-2.27.0-1.2.ppc64le",
"product": {
"name": "libmbedx509-1-2.27.0-1.2.ppc64le",
"product_id": "libmbedx509-1-2.27.0-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"product": {
"name": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"product_id": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-2.27.0-1.2.ppc64le",
"product": {
"name": "mbedtls-devel-2.27.0-1.2.ppc64le",
"product_id": "mbedtls-devel-2.27.0-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedcrypto7-2.27.0-1.2.s390x",
"product": {
"name": "libmbedcrypto7-2.27.0-1.2.s390x",
"product_id": "libmbedcrypto7-2.27.0-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"product": {
"name": "libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"product_id": "libmbedcrypto7-32bit-2.27.0-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libmbedtls13-2.27.0-1.2.s390x",
"product": {
"name": "libmbedtls13-2.27.0-1.2.s390x",
"product_id": "libmbedtls13-2.27.0-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libmbedtls13-32bit-2.27.0-1.2.s390x",
"product": {
"name": "libmbedtls13-32bit-2.27.0-1.2.s390x",
"product_id": "libmbedtls13-32bit-2.27.0-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-2.27.0-1.2.s390x",
"product": {
"name": "libmbedx509-1-2.27.0-1.2.s390x",
"product_id": "libmbedx509-1-2.27.0-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-32bit-2.27.0-1.2.s390x",
"product": {
"name": "libmbedx509-1-32bit-2.27.0-1.2.s390x",
"product_id": "libmbedx509-1-32bit-2.27.0-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-2.27.0-1.2.s390x",
"product": {
"name": "mbedtls-devel-2.27.0-1.2.s390x",
"product_id": "mbedtls-devel-2.27.0-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedcrypto7-2.27.0-1.2.x86_64",
"product": {
"name": "libmbedcrypto7-2.27.0-1.2.x86_64",
"product_id": "libmbedcrypto7-2.27.0-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"product": {
"name": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"product_id": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedtls13-2.27.0-1.2.x86_64",
"product": {
"name": "libmbedtls13-2.27.0-1.2.x86_64",
"product_id": "libmbedtls13-2.27.0-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedtls13-32bit-2.27.0-1.2.x86_64",
"product": {
"name": "libmbedtls13-32bit-2.27.0-1.2.x86_64",
"product_id": "libmbedtls13-32bit-2.27.0-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-2.27.0-1.2.x86_64",
"product": {
"name": "libmbedx509-1-2.27.0-1.2.x86_64",
"product_id": "libmbedx509-1-2.27.0-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"product": {
"name": "libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"product_id": "libmbedx509-1-32bit-2.27.0-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-2.27.0-1.2.x86_64",
"product": {
"name": "mbedtls-devel-2.27.0-1.2.x86_64",
"product_id": "mbedtls-devel-2.27.0-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64"
},
"product_reference": "libmbedcrypto7-2.27.0-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le"
},
"product_reference": "libmbedcrypto7-2.27.0-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-2.27.0-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x"
},
"product_reference": "libmbedcrypto7-2.27.0-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64"
},
"product_reference": "libmbedcrypto7-2.27.0-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64"
},
"product_reference": "libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le"
},
"product_reference": "libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-32bit-2.27.0-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x"
},
"product_reference": "libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64"
},
"product_reference": "libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls13-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64"
},
"product_reference": "libmbedtls13-2.27.0-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls13-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le"
},
"product_reference": "libmbedtls13-2.27.0-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls13-2.27.0-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x"
},
"product_reference": "libmbedtls13-2.27.0-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls13-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64"
},
"product_reference": "libmbedtls13-2.27.0-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls13-32bit-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64"
},
"product_reference": "libmbedtls13-32bit-2.27.0-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls13-32bit-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le"
},
"product_reference": "libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls13-32bit-2.27.0-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x"
},
"product_reference": "libmbedtls13-32bit-2.27.0-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls13-32bit-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64"
},
"product_reference": "libmbedtls13-32bit-2.27.0-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64"
},
"product_reference": "libmbedx509-1-2.27.0-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le"
},
"product_reference": "libmbedx509-1-2.27.0-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-2.27.0-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x"
},
"product_reference": "libmbedx509-1-2.27.0-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64"
},
"product_reference": "libmbedx509-1-2.27.0-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-32bit-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64"
},
"product_reference": "libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le"
},
"product_reference": "libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-32bit-2.27.0-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x"
},
"product_reference": "libmbedx509-1-32bit-2.27.0-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-32bit-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64"
},
"product_reference": "libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-2.27.0-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64"
},
"product_reference": "mbedtls-devel-2.27.0-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-2.27.0-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le"
},
"product_reference": "mbedtls-devel-2.27.0-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-2.27.0-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x"
},
"product_reference": "mbedtls-devel-2.27.0-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-2.27.0-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
},
"product_reference": "mbedtls-devel-2.27.0-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14032"
}
],
"notes": [
{
"category": "general",
"text": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14032",
"url": "https://www.suse.com/security/cve/CVE-2017-14032"
},
{
"category": "external",
"summary": "SUSE Bug 1056544 for CVE-2017-14032",
"url": "https://bugzilla.suse.com/1056544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-14032"
},
{
"cve": "CVE-2017-2784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2784"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2784",
"url": "https://www.suse.com/security/cve/CVE-2017-2784"
},
{
"category": "external",
"summary": "SUSE Bug 1029017 for CVE-2017-2784",
"url": "https://bugzilla.suse.com/1029017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-2784"
},
{
"cve": "CVE-2018-0487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0487"
}
],
"notes": [
{
"category": "general",
"text": "ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0487",
"url": "https://www.suse.com/security/cve/CVE-2018-0487"
},
{
"category": "external",
"summary": "SUSE Bug 1080826 for CVE-2018-0487",
"url": "https://bugzilla.suse.com/1080826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-0487"
},
{
"cve": "CVE-2018-0488",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0488"
}
],
"notes": [
{
"category": "general",
"text": "ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0, when the truncated HMAC extension and CBC are used, allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0488",
"url": "https://www.suse.com/security/cve/CVE-2018-0488"
},
{
"category": "external",
"summary": "SUSE Bug 1080828 for CVE-2018-0488",
"url": "https://bugzilla.suse.com/1080828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-0488"
},
{
"cve": "CVE-2018-19608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19608"
}
],
"notes": [
{
"category": "general",
"text": "Arm Mbed TLS before 2.14.1, before 2.7.8, and before 2.1.17 allows a local unprivileged attacker to recover the plaintext of RSA decryption, which is used in RSA-without-(EC)DH(E) cipher suites.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19608",
"url": "https://www.suse.com/security/cve/CVE-2018-19608"
},
{
"category": "external",
"summary": "SUSE Bug 1118727 for CVE-2018-19608",
"url": "https://bugzilla.suse.com/1118727"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedtls13-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:libmbedx509-1-32bit-2.27.0-1.2.x86_64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.aarch64",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.ppc64le",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.s390x",
"openSUSE Tumbleweed:mbedtls-devel-2.27.0-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19608"
}
]
}
OPENSUSE-SU-2017:2736-1
Vulnerability from csaf_opensuse - Published: 2017-10-16 18:55 - Updated: 2017-10-16 18:55Summary
Security update for mbedtls
Notes
Title of the patch
Security update for mbedtls
Description of the patch
This update for mbedtls fixes the following issues:
- CVE-2017-14032: Possible authentication bypass of peer based authentication when auth mode is configured as 'optional' (boo#1056544).
Patchnames
openSUSE-2017-1156
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for mbedtls",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for mbedtls fixes the following issues:\n\n- CVE-2017-14032: Possible authentication bypass of peer based authentication when auth mode is configured as \u0027optional\u0027 (boo#1056544).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2017-1156",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_2736-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1056544",
"url": "https://bugzilla.suse.com/1056544"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14032 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14032/"
}
],
"title": "Security update for mbedtls",
"tracking": {
"current_release_date": "2017-10-16T18:55:23Z",
"generator": {
"date": "2017-10-16T18:55:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2017:2736-1",
"initial_release_date": "2017-10-16T18:55:23Z",
"revision_history": [
{
"date": "2017-10-16T18:55:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libmbedtls9-1.3.19-8.1.aarch64",
"product": {
"name": "libmbedtls9-1.3.19-8.1.aarch64",
"product_id": "libmbedtls9-1.3.19-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-1.3.19-8.1.aarch64",
"product": {
"name": "mbedtls-devel-1.3.19-8.1.aarch64",
"product_id": "mbedtls-devel-1.3.19-8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedtls9-1.3.19-8.1.ppc64le",
"product": {
"name": "libmbedtls9-1.3.19-8.1.ppc64le",
"product_id": "libmbedtls9-1.3.19-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-1.3.19-8.1.ppc64le",
"product": {
"name": "mbedtls-devel-1.3.19-8.1.ppc64le",
"product_id": "mbedtls-devel-1.3.19-8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedtls9-1.3.19-8.1.s390x",
"product": {
"name": "libmbedtls9-1.3.19-8.1.s390x",
"product_id": "libmbedtls9-1.3.19-8.1.s390x"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-1.3.19-8.1.s390x",
"product": {
"name": "mbedtls-devel-1.3.19-8.1.s390x",
"product_id": "mbedtls-devel-1.3.19-8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedtls9-1.3.19-8.1.x86_64",
"product": {
"name": "libmbedtls9-1.3.19-8.1.x86_64",
"product_id": "libmbedtls9-1.3.19-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-1.3.19-8.1.x86_64",
"product": {
"name": "mbedtls-devel-1.3.19-8.1.x86_64",
"product_id": "mbedtls-devel-1.3.19-8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls9-1.3.19-8.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64"
},
"product_reference": "libmbedtls9-1.3.19-8.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls9-1.3.19-8.1.ppc64le as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le"
},
"product_reference": "libmbedtls9-1.3.19-8.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls9-1.3.19-8.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x"
},
"product_reference": "libmbedtls9-1.3.19-8.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls9-1.3.19-8.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64"
},
"product_reference": "libmbedtls9-1.3.19-8.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-1.3.19-8.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64"
},
"product_reference": "mbedtls-devel-1.3.19-8.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-1.3.19-8.1.ppc64le as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le"
},
"product_reference": "mbedtls-devel-1.3.19-8.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-1.3.19-8.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x"
},
"product_reference": "mbedtls-devel-1.3.19-8.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-1.3.19-8.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64"
},
"product_reference": "mbedtls-devel-1.3.19-8.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14032"
}
],
"notes": [
{
"category": "general",
"text": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14032",
"url": "https://www.suse.com/security/cve/CVE-2017-14032"
},
{
"category": "external",
"summary": "SUSE Bug 1056544 for CVE-2017-14032",
"url": "https://bugzilla.suse.com/1056544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-16T18:55:23Z",
"details": "important"
}
],
"title": "CVE-2017-14032"
}
]
}
OPENSUSE-SU-2017:2731-1
Vulnerability from csaf_opensuse - Published: 2017-10-16 18:55 - Updated: 2017-10-16 18:55Summary
Security update for mbedtls
Notes
Title of the patch
Security update for mbedtls
Description of the patch
This update for mbedtls fixes the following issues:
- CVE-2017-14032: Possible authentication bypass of peer based authentication when auth mode is configured as 'optional' (boo#1056544).
Patchnames
openSUSE-2017-1156
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for mbedtls",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for mbedtls fixes the following issues:\n\n- CVE-2017-14032: Possible authentication bypass of peer based authentication when auth mode is configured as \u0027optional\u0027 (boo#1056544).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2017-1156",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_2731-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1056544",
"url": "https://bugzilla.suse.com/1056544"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14032 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14032/"
}
],
"title": "Security update for mbedtls",
"tracking": {
"current_release_date": "2017-10-16T18:55:23Z",
"generator": {
"date": "2017-10-16T18:55:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2017:2731-1",
"initial_release_date": "2017-10-16T18:55:23Z",
"revision_history": [
{
"date": "2017-10-16T18:55:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libmbedtls9-1.3.19-8.1.aarch64",
"product": {
"name": "libmbedtls9-1.3.19-8.1.aarch64",
"product_id": "libmbedtls9-1.3.19-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-1.3.19-8.1.aarch64",
"product": {
"name": "mbedtls-devel-1.3.19-8.1.aarch64",
"product_id": "mbedtls-devel-1.3.19-8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedtls9-1.3.19-8.1.ppc64le",
"product": {
"name": "libmbedtls9-1.3.19-8.1.ppc64le",
"product_id": "libmbedtls9-1.3.19-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-1.3.19-8.1.ppc64le",
"product": {
"name": "mbedtls-devel-1.3.19-8.1.ppc64le",
"product_id": "mbedtls-devel-1.3.19-8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedtls9-1.3.19-8.1.s390x",
"product": {
"name": "libmbedtls9-1.3.19-8.1.s390x",
"product_id": "libmbedtls9-1.3.19-8.1.s390x"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-1.3.19-8.1.s390x",
"product": {
"name": "mbedtls-devel-1.3.19-8.1.s390x",
"product_id": "mbedtls-devel-1.3.19-8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedtls9-1.3.19-8.1.x86_64",
"product": {
"name": "libmbedtls9-1.3.19-8.1.x86_64",
"product_id": "libmbedtls9-1.3.19-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "mbedtls-devel-1.3.19-8.1.x86_64",
"product": {
"name": "mbedtls-devel-1.3.19-8.1.x86_64",
"product_id": "mbedtls-devel-1.3.19-8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls9-1.3.19-8.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64"
},
"product_reference": "libmbedtls9-1.3.19-8.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls9-1.3.19-8.1.ppc64le as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le"
},
"product_reference": "libmbedtls9-1.3.19-8.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls9-1.3.19-8.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x"
},
"product_reference": "libmbedtls9-1.3.19-8.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls9-1.3.19-8.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64"
},
"product_reference": "libmbedtls9-1.3.19-8.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-1.3.19-8.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64"
},
"product_reference": "mbedtls-devel-1.3.19-8.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-1.3.19-8.1.ppc64le as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le"
},
"product_reference": "mbedtls-devel-1.3.19-8.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-1.3.19-8.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x"
},
"product_reference": "mbedtls-devel-1.3.19-8.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-devel-1.3.19-8.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64"
},
"product_reference": "mbedtls-devel-1.3.19-8.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14032"
}
],
"notes": [
{
"category": "general",
"text": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14032",
"url": "https://www.suse.com/security/cve/CVE-2017-14032"
},
{
"category": "external",
"summary": "SUSE Bug 1056544 for CVE-2017-14032",
"url": "https://bugzilla.suse.com/1056544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.s390x",
"SUSE Package Hub 12:libmbedtls9-1.3.19-8.1.x86_64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.aarch64",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.ppc64le",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.s390x",
"SUSE Package Hub 12:mbedtls-devel-1.3.19-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-16T18:55:23Z",
"details": "important"
}
],
"title": "CVE-2017-14032"
}
]
}
GSD-2017-14032
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-14032",
"description": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.",
"id": "GSD-2017-14032",
"references": [
"https://www.suse.com/security/cve/CVE-2017-14032.html",
"https://www.debian.org/security/2017/dsa-3967",
"https://advisories.mageia.org/CVE-2017-14032.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-14032"
],
"details": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.",
"id": "GSD-2017-14032",
"modified": "2023-12-13T01:21:12.676081Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-14032",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-3967",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3967"
},
{
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02",
"refsource": "CONFIRM",
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02"
},
{
"name": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32",
"refsource": "CONFIRM",
"url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32"
},
{
"name": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc",
"refsource": "CONFIRM",
"url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc"
},
{
"name": "https://bugs.debian.org/873557",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/873557"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:1.3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arm:mbed_tls:2.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-14032"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02"
},
{
"name": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc"
},
{
"name": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32"
},
{
"name": "https://bugs.debian.org/873557",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/873557"
},
{
"name": "DSA-3967",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2017/dsa-3967"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
},
"lastModifiedDate": "2017-11-08T02:29Z",
"publishedDate": "2017-08-30T20:29Z"
}
}
}
GHSA-6V28-R64J-R4W6
Vulnerability from github – Published: 2022-05-17 00:25 – Updated: 2022-05-17 00:25
VLAI?
Details
ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.
Severity ?
8.1 (High)
{
"affected": [],
"aliases": [
"CVE-2017-14032"
],
"database_specific": {
"cwe_ids": [
"CWE-287"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-08-30T20:29:00Z",
"severity": "HIGH"
},
"details": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.",
"id": "GHSA-6v28-r64j-r4w6",
"modified": "2022-05-17T00:25:45Z",
"published": "2022-05-17T00:25:45Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14032"
},
{
"type": "WEB",
"url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32"
},
{
"type": "WEB",
"url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc"
},
{
"type": "WEB",
"url": "https://bugs.debian.org/873557"
},
{
"type": "WEB",
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2017/dsa-3967"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2017-14032
Vulnerability from fkie_nvd - Published: 2017-08-30 20:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| arm | mbed_tls | 1.3.10 | |
| arm | mbed_tls | 1.3.11 | |
| arm | mbed_tls | 1.3.12 | |
| arm | mbed_tls | 1.3.13 | |
| arm | mbed_tls | 1.3.14 | |
| arm | mbed_tls | 1.3.15 | |
| arm | mbed_tls | 1.3.16 | |
| arm | mbed_tls | 1.3.17 | |
| arm | mbed_tls | 1.3.18 | |
| arm | mbed_tls | 1.3.19 | |
| arm | mbed_tls | 1.3.20 | |
| arm | mbed_tls | 1.3.21 | |
| arm | mbed_tls | 2.0.0 | |
| arm | mbed_tls | 2.1.0 | |
| arm | mbed_tls | 2.1.1 | |
| arm | mbed_tls | 2.1.2 | |
| arm | mbed_tls | 2.1.3 | |
| arm | mbed_tls | 2.1.4 | |
| arm | mbed_tls | 2.1.5 | |
| arm | mbed_tls | 2.1.6 | |
| arm | mbed_tls | 2.1.7 | |
| arm | mbed_tls | 2.1.8 | |
| arm | mbed_tls | 2.1.9 | |
| arm | mbed_tls | 2.2.0 | |
| arm | mbed_tls | 2.2.1 | |
| arm | mbed_tls | 2.3.0 | |
| arm | mbed_tls | 2.4.0 | |
| arm | mbed_tls | 2.4.2 | |
| arm | mbed_tls | 2.5.1 | |
| arm | mbed_tls | 2.6.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "28621156-2430-447B-8816-47B0FB58245B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E11BBB2C-0423-47B1-AE12-EB849E17BAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4131CE76-6260-412C-A6A6-20B0E978E569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "DE92D8F7-5705-47B6-B2C2-9DE6C7880647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "EA50C256-2054-4661-9C42-D31D7D87BAF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7791D4E9-3FEE-42DA-B320-CF7188A10294",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "BE415DAA-A89F-4204-AC2C-577FCB447E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "95F691DB-9552-4EBB-B29D-16658561FA4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F1547B2A-E0D5-41D1-9449-1CCF35022B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "CF762122-64BC-4A1A-A26D-81C1270541A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "59D6B559-5F99-4E38-A861-3AB8A7D2E6BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:1.3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4A8956C8-6CF0-4C37-84F9-8A89726806C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0B395D81-876F-43FC-8DB9-44377647A37A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F92622F1-82DA-4819-8275-06DC9DBE1BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5871FDE9-02D0-466C-BDB7-90A14C4F637E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6B4875-3FC3-499F-A76B-2D04982F743A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B67842-5AFA-459F-9CCF-772B9DC7139F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0500EE-52C0-4896-B3D8-5BE731D66039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "015739E9-C0E3-4A62-BB9D-FA836BFD4351",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "842B0D15-6A3D-4CEE-AD02-49B0436E78E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF6E05C-E6E5-40B8-AFEA-A5ED937F5439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D4133C86-70E0-44FD-BBDB-D61EFB31F027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6F9D24F0-3892-417F-9C3A-CACEF00C2293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8911513E-968C-403E-9D00-2DC0AA82F99B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "48D98945-82BB-4954-AA6D-7D98E4CE1154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6378C1CC-7C8F-47E3-A1A7-CDEC76E4CBE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "525190A3-2194-4E4E-9D34-0048583B9C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70407352-624A-40E6-82E4-7B4FAFE0C0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD52988E-4B2F-41AF-BC25-F38F87D9B8C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FD1F7803-31F3-40A9-A878-FDC757FCE83F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected."
},
{
"lang": "es",
"value": "ARM mbed TLS en versiones anteriores a la 1.3.21 y en versiones 2.x anteriores a la 2.1.9, si se configura la autenticaci\u00f3n opcional, permite a los atacantes omitir la autenticaci\u00f3n Peer mediante una cadena de certificados X.509 con muchos intermediarios. NOTA: aunque mbed TLS se conoc\u00eda antes como PolarSSL, las versiones lanzadas con el nombre PolarSSL no est\u00e1n afectadas."
}
],
"id": "CVE-2017-14032",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-08-30T20:29:00.337",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2017/dsa-3967"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/873557"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2017/dsa-3967"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/873557"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…