Name | CVE-2017-14032 |
Description | ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3967-1 |
Debian Bugs | 873557 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mbedtls (PTS) | bullseye | 2.16.9-0.1 | fixed |
bookworm | 2.28.3-1 | fixed | |
sid, trixie | 3.6.2-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mbedtls | source | stretch | 2.4.2-1+deb9u1 | DSA-3967-1 | ||
mbedtls | source | (unstable) | 2.6.0-1 | 873557 | ||
polarssl | source | wheezy | (not affected) | |||
polarssl | source | jessie | (not affected) | |||
polarssl | source | (unstable) | (unfixed) |
[jessie] - polarssl <not-affected> (Vulnerable code not present)
[wheezy] - polarssl <not-affected> (Vulnerable code not present)
Affected versions: all from version 1.3.10 up and including 2.1 and later releases
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02
https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32
https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc