<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libmbedcrypto7-2.28.3-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12903-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libmbedcrypto7-2.28.3-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libmbedcrypto7-2.28.3-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12903</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8627/</URL>
      <Description>SUSE CVE CVE-2014-8627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8628/</URL>
      <Description>SUSE CVE CVE-2014-8628 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1182/</URL>
      <Description>SUSE CVE CVE-2015-1182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5291/</URL>
      <Description>SUSE CVE CVE-2015-5291 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7575/</URL>
      <Description>SUSE CVE CVE-2015-7575 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmbedcrypto7-2.28.3-1.1">
      <FullProductName ProductID="libmbedcrypto7-2.28.3-1.1">libmbedcrypto7-2.28.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmbedcrypto7-x86-64-v3-2.28.3-1.1">
      <FullProductName ProductID="libmbedcrypto7-x86-64-v3-2.28.3-1.1">libmbedcrypto7-x86-64-v3-2.28.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmbedtls14-2.28.3-1.1">
      <FullProductName ProductID="libmbedtls14-2.28.3-1.1">libmbedtls14-2.28.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmbedtls14-x86-64-v3-2.28.3-1.1">
      <FullProductName ProductID="libmbedtls14-x86-64-v3-2.28.3-1.1">libmbedtls14-x86-64-v3-2.28.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmbedx509-1-2.28.3-1.1">
      <FullProductName ProductID="libmbedx509-1-2.28.3-1.1">libmbedx509-1-2.28.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmbedx509-1-x86-64-v3-2.28.3-1.1">
      <FullProductName ProductID="libmbedx509-1-x86-64-v3-2.28.3-1.1">libmbedx509-1-x86-64-v3-2.28.3-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mbedtls-2-devel-2.28.3-1.1">
      <FullProductName ProductID="mbedtls-2-devel-2.28.3-1.1">mbedtls-2-devel-2.28.3-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmbedcrypto7-2.28.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmbedcrypto7-2.28.3-1.1">libmbedcrypto7-2.28.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmbedcrypto7-x86-64-v3-2.28.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.3-1.1">libmbedcrypto7-x86-64-v3-2.28.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmbedtls14-2.28.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmbedtls14-2.28.3-1.1">libmbedtls14-2.28.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmbedtls14-x86-64-v3-2.28.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.3-1.1">libmbedtls14-x86-64-v3-2.28.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmbedx509-1-2.28.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmbedx509-1-2.28.3-1.1">libmbedx509-1-2.28.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmbedx509-1-x86-64-v3-2.28.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.3-1.1">libmbedx509-1-x86-64-v3-2.28.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mbedtls-2-devel-2.28.3-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mbedtls-2-devel-2.28.3-1.1">mbedtls-2-devel-2.28.3-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-8627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mbedtls-2-devel-2.28.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8627.html</URL>
        <Description>CVE-2014-8627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903672</URL>
        <Description>SUSE Bug 903672</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in PolarSSL before 1.2.12 and 1.3.x before 1.3.9 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted X.509 certificates.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2014-9744 for the ClientHello message issue.</Note>
    </Notes>
    <CVE>CVE-2014-8628</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mbedtls-2-devel-2.28.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8628.html</URL>
        <Description>CVE-2014-8628</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903672</URL>
        <Description>SUSE Bug 903672</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asn1_get_sequence_of function in library/asn1parse.c in PolarSSL 1.0 through 1.2.12 and 1.3.x through 1.3.9 does not properly initialize a pointer in the asn1_sequence linked list, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ASN.1 sequence in a certificate.</Note>
    </Notes>
    <CVE>CVE-2015-1182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mbedtls-2-devel-2.28.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1182.html</URL>
        <Description>CVE-2015-1182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/913903</URL>
        <Description>SUSE Bug 913903</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message.  NOTE: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue that was introduced in 1.3.0.</Note>
    </Notes>
    <CVE>CVE-2015-5291</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mbedtls-2-devel-2.28.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5291.html</URL>
        <Description>CVE-2015-5291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949380</URL>
        <Description>SUSE Bug 949380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989694</URL>
        <Description>SUSE Bug 989694</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.</Note>
    </Notes>
    <CVE>CVE-2015-7575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.3-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mbedtls-2-devel-2.28.3-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7575.html</URL>
        <Description>CVE-2015-7575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959888</URL>
        <Description>SUSE Bug 959888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960996</URL>
        <Description>SUSE Bug 960996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961280</URL>
        <Description>SUSE Bug 961280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961281</URL>
        <Description>SUSE Bug 961281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961282</URL>
        <Description>SUSE Bug 961282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961283</URL>
        <Description>SUSE Bug 961283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961284</URL>
        <Description>SUSE Bug 961284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961290</URL>
        <Description>SUSE Bug 961290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961357</URL>
        <Description>SUSE Bug 961357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967521</URL>
        <Description>SUSE Bug 967521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981087</URL>
        <Description>SUSE Bug 981087</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
