|Description||ARM mbed TLS before 1.3.21 and 2.x before 2.1.9, if optional authentication is configured, allows remote attackers to bypass peer authentication via an X.509 certificate chain with many intermediates. NOTE: although mbed TLS was formerly known as PolarSSL, the releases shipped with the PolarSSL name are not affected.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||medium (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|mbedtls (PTS)||stretch (security), stretch||2.4.2-1+deb9u1||fixed|
|polarssl (PTS)||wheezy, wheezy (security)||1.2.9-1~deb7u6||fixed|
The information below is based on the following data on fixed versions.
[jessie] - polarssl <not-affected> (Vulnerable code not present)
[wheezy] - polarssl <not-affected> (Vulnerable code not present)
Affected versions: all from version 1.3.10 up and including 2.1 and later releases