group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #13558
[Bug 1672686] Re: CVE-2017-2784 - Freeing of memory allocated on stack when validating a public key with a secp224k1 curve
** Changed in: polarssl (Debian)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1672686
Title:
CVE-2017-2784 - Freeing of memory allocated on stack when validating a
public key with a secp224k1 curve
Status in mbedtls package in Ubuntu:
Fix Released
Status in polarssl package in Ubuntu:
Incomplete
Status in mbedtls source package in Xenial:
Fix Released
Status in polarssl source package in Xenial:
Confirmed
Status in mbedtls source package in Yakkety:
Fix Released
Status in polarssl source package in Yakkety:
Confirmed
Status in mbedtls package in Debian:
Fix Released
Status in polarssl package in Debian:
Fix Released
Bug description:
The following security bug was published for mbedtls:
Freeing of memory allocated on stack when validating a public key with
a secp224k1 curve
[Vulnerability]
If a malicious peer supplies a certificate with a specially crafted secp224k1 public key, then an attacker can cause the server or client to attempt to free block of memory held on stack.
[Impact]
Depending on the platform, this could result in a Denial of Service (client crash) or potentially could be exploited to allow remote code execution with the same privileges as the host application.
[Resolution]
Affected users should upgrade to mbed TLS 1.3.19, mbed TLS 2.1.7 or mbed TLS 2.4.2.
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-
security-advisory-2017-01
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mbedtls/+bug/1672686/+subscriptions