ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libmbedcrypto0", "binary_version": "2.2.1-2ubuntu0.3" }, { "binary_name": "libmbedcrypto0-dbgsym", "binary_version": "2.2.1-2ubuntu0.3" }, { "binary_name": "libmbedtls-dev", "binary_version": "2.2.1-2ubuntu0.3" }, { "binary_name": "libmbedtls-doc", "binary_version": "2.2.1-2ubuntu0.3" }, { "binary_name": "libmbedtls10", "binary_version": "2.2.1-2ubuntu0.3" }, { "binary_name": "libmbedtls10-dbgsym", "binary_version": "2.2.1-2ubuntu0.3" }, { "binary_name": "libmbedx509-0", "binary_version": "2.2.1-2ubuntu0.3" }, { "binary_name": "libmbedx509-0-dbgsym", "binary_version": "2.2.1-2ubuntu0.3" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libmbedcrypto1", "binary_version": "2.7.0-2" }, { "binary_name": "libmbedcrypto1-dbgsym", "binary_version": "2.7.0-2" }, { "binary_name": "libmbedtls-dev", "binary_version": "2.7.0-2" }, { "binary_name": "libmbedtls-doc", "binary_version": "2.7.0-2" }, { "binary_name": "libmbedtls10", "binary_version": "2.7.0-2" }, { "binary_name": "libmbedtls10-dbgsym", "binary_version": "2.7.0-2" }, { "binary_name": "libmbedx509-0", "binary_version": "2.7.0-2" }, { "binary_name": "libmbedx509-0-dbgsym", "binary_version": "2.7.0-2" } ] }