ARM mbedTLS version 2.7.0 and earlier contains a Ciphersuite Allows Incorrectly Signed Certificates vulnerability in mbedtlssslgetverifyresult() that can result in ECDSA-signed certificates are accepted, when only RSA-signed ones should be.. This attack appear to be exploitable via Peers negotiate a TLS-ECDH-RSA-* ciphersuite. Any of the peers can then provide an ECDSA-signed certificate, when only an RSA-signed one should be accepted..
{ "binaries": [ { "binary_version": "2.28.0-1build1", "binary_name": "libmbedcrypto7" }, { "binary_version": "2.28.0-1build1", "binary_name": "libmbedtls-dev" }, { "binary_version": "2.28.0-1build1", "binary_name": "libmbedtls14" }, { "binary_version": "2.28.0-1build1", "binary_name": "libmbedx509-1" } ] }
{ "binaries": [ { "binary_version": "2.28.8-1", "binary_name": "libmbedcrypto7t64" }, { "binary_version": "2.28.8-1", "binary_name": "libmbedtls-dev" }, { "binary_version": "2.28.8-1", "binary_name": "libmbedtls14t64" }, { "binary_version": "2.28.8-1", "binary_name": "libmbedx509-1t64" } ] }
{ "binaries": [ { "binary_version": "3.6.2-3ubuntu1", "binary_name": "libmbedcrypto16" }, { "binary_version": "3.6.2-3ubuntu1", "binary_name": "libmbedtls-dev" }, { "binary_version": "3.6.2-3ubuntu1", "binary_name": "libmbedtls21" }, { "binary_version": "3.6.2-3ubuntu1", "binary_name": "libmbedx509-7" } ] }
{ "binaries": [ { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedcrypto0" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedtls-dev" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedtls10" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedx509-0" } ] }
{ "binaries": [ { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedcrypto3" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedtls-dev" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedtls12" }, { "binary_version": "2.16.4-1ubuntu2", "binary_name": "libmbedx509-0" } ] }