An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
References
Link | Resource |
---|---|
https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2 | Release Notes Third Party Advisory |
https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0 | Release Notes Third Party Advisory |
https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/ | Mailing List Third Party Advisory |
Information
Published : 2022-12-15 15:15
Updated : 2023-03-01 07:11
NVD link : CVE-2022-46393
Mitre link : CVE-2022-46393
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
arm
- mbed_tls
fedoraproject
- fedora