File _patchinfo of Package patchinfo.7802
<patchinfo incident="7802"> <issue id="1080973" tracker="bnc">VUL-0: CVE-2017-18187: mbedtls: bounds check bypass through overflow in PSK identity parsing</issue> <issue id="1080826" tracker="bnc">VUL-0: CVE-2018-0487 mbedtls: Risk of remote code execution when verifying RSASSA-PSS signatures</issue> <issue id="1080828" tracker="bnc">VUL-0: CVE-2018-0488 mbedtls: Risk of remote code execution when truncated HMAC is enabled</issue> <issue id="2018-0488" tracker="cve" /> <issue id="2018-0487" tracker="cve" /> <issue id="2017-18187" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>AndreasStieger</packager> <description>This update for mbedtls fixes the following issues: - CVE-2018-0487: Fixed a buffer overflow in RSASSA-PSS signature verification, which allowed remote attackers to execute arbitrary code or cause a denial of service via a crafted certificate chain. (boo#1080826) - CVE-2018-0488: Fixed a heap vulnerability, which allowed remote attackers to execute arbitrary code or cause a DoS via a crafted application packet when the truncated HMAC extension and CBC are used. (boo#1080828) - CVE-2017-18187: Fixed bound check in ssl_parse_client_psk_identity(), which might lead to an overflow. (boo#1080973) </description> <summary>Security update for mbedtls</summary> </patchinfo>