Advisories ยป MGASA-2022-0415

Updated mbedtls packages fix security vulnerability

Publication date: 08 Nov 2022
Modification date: 08 Nov 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-35409

Description

An unauthenticated remote host could send an invalid ClientHello message in
which the declared length of the cookie extends past the end of the message.
A DTLS server with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled would read past
the end of the message up to the declared length of the cookie. This could
cause a buffer overread of up to 255 bytes on the heap in vulnerable DTLS
servers, which may lead to a crash or to information disclosure via the
cookie check function (CVE-2022-35409).

This issue has been patched, backporting a fix from upstream's 2.28.0 release.
                

References

SRPMS

8/core