Release notes: https://tls.mbed.org/tech-updates/releases/mbedtls-2.13.0-2.7.6-and-2.1.15-released
the vulnerability CVE-2018-1000520 is documented in issue #1561 on github: https://github.com/ARMmbed/mbedtls/issues/1561 This vulnerability is about accepting a certificate which should not be accepted and is still open.
However regarding the release notes of ARM mbedTLS https://github.com/ARMmbed/mbedtls/releases/tag/mbedtls-2.7.6 the security fix is: Fixed an issue in the X.509 module which could lead to a buffer overread during certificate extensions parsing. A read of one byte beyond the limit of the input buffer was made, when the extensions length field was zero. Found by Nathan Crandall.
This is clearly something different, so my question is which vulnerabilities have been fixed in this security update? Is it just CVE-2018-1000520 or the one from the release notes without CVE identifier or both?
You're right. Referring to https://github.com/ARMmbed/mbedtls/issues/1561 indicates that the issue hasn't been fixed with the latest 2.7.6 release. Anyway, it's not exploitable. (see https://github.com/ARMmbed/mbedtls/issues/1561#issuecomment-421098364) I will remove CVE-2018-1000520 from this update. For CVE-2018-1000520, we have to wait for an upstream fix.
The current (2.7.6) update contains only a fix for the security issue documented in the release notes.
Please login to add feedback.
Copyright © 2007-2019 Red Hat, Inc. and
bodhi is Free Software.
if you have any problems. Read the documentation.