An issue was discovered in Arm Mbed TLS before 2.24.0. It incorrectly uses a revocationDate check when deciding whether to honor certificate revocation via a CRL. In some situations, an attacker can exploit this by changing the local clock.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.17 | third party advisory release notes |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.8 | third party advisory release notes |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.24.0 | third party advisory release notes |
https://bugs.gentoo.org/740108 | issue tracking third party advisory patch |
https://github.com/ARMmbed/mbedtls/pull/3433 | third party advisory |
https://github.com/ARMmbed/mbedtls/issues/3340 | issue tracking exploit third party advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html | third party advisory mailing list |