Bug 1219336 (CVE-2024-23170) - VUL-0: CVE-2024-23170: mbedtls: timing side channel in private key RSA operations
Summary: VUL-0: CVE-2024-23170: mbedtls: timing side channel in private key RSA operat...
Status: IN_PROGRESS
Alias: CVE-2024-23170
Product: openSUSE Distribution
Classification: openSUSE
Component: Other (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Martin Pluskal
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/392471/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-01-30 08:57 UTC by SMASH SMASH
Modified: 2024-01-31 23:04 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-01-30 08:57:39 UTC
CVE-2024-23170 Timing side channel in private key RSA operations.

Mbed TLS is vulnerable to a timing side channel in private key RSA operations. This side channel could be sufficient for an attacker to recover the plaintext. A local attacker or a remote attacker who is close to the victim on the network might have precise enough timing measurements to exploit this. It requires the attacker to send a large number of messages for decryption.

https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/

Resolution: update net-libs/mbedtls to 2.28.7 and 3.5.2.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-23170
https://bugzilla.redhat.com/show_bug.cgi?id=2261598
Comment 1 Andrea Mattiazzo 2024-01-30 08:58:13 UTC
Tracking as affected:
- openSUSE:Backports:SLE-15-SP4/mbedtls  2.28.0
- openSUSE:Backports:SLE-15-SP5/mbedtls  2.28.2
- openSUSE:Factory/mbedtls               3.5.1 
- openSUSE:Factory/mbedtls-2             2.28.6
Comment 2 Martin Pluskal 2024-01-31 08:29:14 UTC
(In reply to Andrea Mattiazzo from comment #1)
> Tracking as affected:
> - openSUSE:Backports:SLE-15-SP4/mbedtls  2.28.0
Is SP4 still supported?
Comment 3 Andrea Mattiazzo 2024-01-31 09:09:58 UTC
(In reply to Martin Pluskal from comment #2)
> (In reply to Andrea Mattiazzo from comment #1)
> > Tracking as affected:
> > - openSUSE:Backports:SLE-15-SP4/mbedtls  2.28.0
> Is SP4 still supported?

No, it's not supported, so it's up to maintainers if they want to fix also that code stream or not.
Comment 4 OBSbugzilla Bot 2024-01-31 09:35:02 UTC
This is an autogenerated message for OBS integration:
This bug (1219336) was mentioned in
https://build.opensuse.org/request/show/1142919 Factory / mbedtls
https://build.opensuse.org/request/show/1142922 Factory / mbedtls-2
https://build.opensuse.org/request/show/1142926 Backports:SLE-15-SP5 / mbedtls
Comment 5 Marcus Meissner 2024-01-31 23:04:58 UTC
openSUSE-SU-2024:0037-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1219336
CVE References: CVE-2024-23170
JIRA References: 
Sources used:
openSUSE Backports SLE-15-SP5 (src):    mbedtls-2.28.7-bp155.2.3.1