{"id":"MGASA-2020-0265","summary":"Updated mbedtls packages fix security vulnerability","details":"Updated mbedtls packages fix security vulnerability\n\nFix side channel in ECC code that allowed an adversary with access to precise\nenough timing and memory access information (typically an untrusted operating\nsystem attacking a secure enclave) to fully recover an ECDSA private key.\n(CVE-2020-10932)\n\nFix a potentially remotely exploitable buffer overread in a DTLS client when\nparsing the Hello Verify Request message.\n","modified":"2026-01-31T12:57:48.746253Z","published":"2020-06-16T07:45:15Z","related":["CVE-2020-10932"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0265.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26758"},{"type":"REPORT","url":"https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released"},{"type":"REPORT","url":"https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-04"}],"affected":[{"package":{"name":"mbedtls","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/mbedtls?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.16.6-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0265.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}