Bugzilla – Bug 1103036
VUL-1: CVE-2018-0497: mbedtls: partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack
Last modified: 2020-01-16 14:26:53 UTC
ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote
attackers to achieve partial plaintext recovery (for a CBC based ciphersuite)
via a timing-based side-channel attack. This vulnerability exists because of an
incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169.
This is automated batch bugzilla cleanup.
The openSUSE 42.3 changed to end-of-life (EOL ) status. As such
it is no longer maintained, which means that it will not receive any
further security or bug fix updates.
As a result we are closing this bug.
If you can reproduce this bug against a currently maintained version of
openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please
feel free to reopen this bug against that version (!you must update the
"Version" component in the bug fields, do not just reopen please), or
alternatively create a new ticket.
Thank you for reporting this bug and we are sorry it could not be fixed
during the lifetime of the release.
15.0 and 15.1 seem unfixed
Leap 15.1 still needs an update.