*** This bug is a security vulnerability ***

Public security bug reported:

The following security bug was published for mbedtls:

Freeing of memory allocated on stack when validating a public key with a
secp224k1 curve

[Vulnerability]
If a malicious peer supplies a certificate with a specially crafted secp224k1 
public key, then an attacker can cause the server or client to attempt to free 
block of memory held on stack.

[Impact]
Depending on the platform, this could result in a Denial of Service (client 
crash) or potentially could be exploited to allow remote code execution with 
the same privileges as the host application.

[Resolution]
Affected users should upgrade to mbed TLS 1.3.19, mbed TLS 2.1.7 or mbed TLS 
2.4.2.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-
advisory-2017-01

** Affects: mbedtls (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: polarssl (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: mbedtls (Debian)
     Importance: Unknown
         Status: Unknown

** Affects: polarssl (Debian)
     Importance: Unknown
         Status: Unknown

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-2748

** Bug watch added: Debian Bug tracker #857560
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857560

** Also affects: mbedtls (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857560
   Importance: Unknown
       Status: Unknown

** Also affects: polarssl (Ubuntu)
   Importance: Undecided
       Status: New

** Bug watch added: Debian Bug tracker #857561
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857561

** Also affects: polarssl (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857561
   Importance: Unknown
       Status: Unknown

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1672686

Title:
  CVE-2017-2748 - Freeing of memory allocated on stack when validating a
  public key with a secp224k1 curve

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mbedtls/+bug/1672686/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to