First published: Mon Jul 19 2021(Updated: )
An issue was discovered in Arm Mbed TLS before 2.24.0. mbedtls_x509_crl_parse_der has a buffer over-read (of one byte).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM mbed TLS | <2.7.17 | |
ARM mbed TLS | >=2.8.0<2.16.8 | |
ARM mbed TLS | >=2.17.0<2.24.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36426 is a vulnerability discovered in Arm Mbed TLS before version 2.24.0, which allows a buffer over-read of one byte in the mbedtls_x509_crl_parse_der function.
The severity of CVE-2020-36426 is high with a CVSS score of 7.5.
The affected software includes Arm Mbed TLS versions up to and excluding 2.7.17, versions between 2.8.0 and 2.16.8 (inclusive), and versions between 2.17.0 and 2.24.0 (inclusive). Debian Linux version 10.0 is also affected.
To fix CVE-2020-36426, update to Arm Mbed TLS version 2.24.0 or later, which contains a fix for the vulnerability.
Yes, you can refer to the following links for more information: [Gentoo Bug Tracker](https://bugs.gentoo.org/740108), [Arm Mbed TLS Release v2.16.8](https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.8), [Arm Mbed TLS Release v2.24.0](https://github.com/ARMmbed/mbedtls/releases/tag/v2.24.0).