Updated mbedtls packages fix security vulnerability
Publication date: 08 Nov 2022Modification date: 08 Nov 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-35409
Description
An unauthenticated remote host could send an invalid ClientHello message in which the declared length of the cookie extends past the end of the message. A DTLS server with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled would read past the end of the message up to the declared length of the cookie. This could cause a buffer overread of up to 255 bytes on the heap in vulnerable DTLS servers, which may lead to a crash or to information disclosure via the cookie check function (CVE-2022-35409). This issue has been patched, backporting a fix from upstream's 2.28.0 release.
References
- https://bugs.mageia.org/show_bug.cgi?id=31058
- https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/mbedtls-security-advisory-2022-07/
- https://github.com/Mbed-TLS/mbedtls/commit/e5af9fabf7d68e3807b6ea78792794b8352dbba2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35409
SRPMS
8/core
- mbedtls-2.16.12-1.1.mga8