An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
References
Configurations
History
21 Apr 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ - Vendor Advisory | |
References | () https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0 - Release Notes, Third Party Advisory | |
References | () https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2 - Release Notes, Third Party Advisory |
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 |
Information
Published : 2022-12-15 23:15
Updated : 2025-04-21 15:15
NVD link : CVE-2022-46393
Mitre link : CVE-2022-46393
JSON object : View
Products Affected
arm
- mbed_tls
fedoraproject
- fedora