MGASA-2022-0415 - Updated mbedtls packages fix security vulnerability Publication date: 08 Nov 2022 URL: https://advisories.mageia.org/MGASA-2022-0415.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-35409 An unauthenticated remote host could send an invalid ClientHello message in which the declared length of the cookie extends past the end of the message. A DTLS server with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled would read past the end of the message up to the declared length of the cookie. This could cause a buffer overread of up to 255 bytes on the heap in vulnerable DTLS servers, which may lead to a crash or to information disclosure via the cookie check function (CVE-2022-35409). This issue has been patched, backporting a fix from upstream's 2.28.0 release. References: - https://bugs.mageia.org/show_bug.cgi?id=31058 - https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/mbedtls-security-advisory-2022-07/ - https://github.com/Mbed-TLS/mbedtls/commit/e5af9fabf7d68e3807b6ea78792794b8352dbba2 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35409 SRPMS: - 8/core/mbedtls-2.16.12-1.1.mga8