{
  "schema_version": "1.6.2",
  "id": "MGASA-2020-0265",
  "published": "2020-06-16T07:45:15Z",
  "modified": "2020-06-16T07:06:19Z",
  "summary": "Updated mbedtls packages fix security vulnerability",
  "details": "Updated mbedtls packages fix security vulnerability\n\nFix side channel in ECC code that allowed an adversary with access to precise\nenough timing and memory access information (typically an untrusted operating\nsystem attacking a secure enclave) to fully recover an ECDSA private key.\n(CVE-2020-10932)\n\nFix a potentially remotely exploitable buffer overread in a DTLS client when\nparsing the Hello Verify Request message.\n",
  "related": [
    "CVE-2020-10932"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2020-0265.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=26758"
    },
    {
      "type": "REPORT",
      "url": "https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released"
    },
    {
      "type": "REPORT",
      "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-04"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:7",
        "name": "mbedtls",
        "purl": "pkg:rpm/mageia/mbedtls?arch=source&distro=mageia-7"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.16.6-1.mga7"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
