Mageia 2022-0415: mbedtls security update
Summary
An unauthenticated remote host could send an invalid ClientHello message in
which the declared length of the cookie extends past the end of the message.
A DTLS server with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled would read past
the end of the message up to the declared length of the cookie. This could
cause a buffer overread of up to 255 bytes on the heap in vulnerable DTLS
servers, which may lead to a crash or to information disclosure via the
cookie check function (CVE-2022-35409).
This issue has been patched, backporting a fix from upstream's 2.28.0 release.
References
- https://bugs.mageia.org/show_bug.cgi?id=31058
- - https://github.com/Mbed-TLS/mbedtls/commit/e5af9fabf7d68e3807b6ea78792794b8352dbba2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35409
Resolution
MGASA-2022-0415 - Updated mbedtls packages fix security vulnerability
SRPMS
- 8/core/mbedtls-2.16.12-1.1.mga8