Bug 2272172 (CVE-2024-28960)

Summary: CVE-2024-28960 mbedtls: Insecure handling of shared memory in PSA Crypto APIs
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mbedtls 2.28.8 Doc Type: ---
Doc Text:
A flaw was found in Mbed TLS. When a function takes parameters in memory that is shared with another protection domain (process, partition, etc.) that is untrusted, the untrusted domain can access the shared memory during the execution of the function, which can compromise various security properties and lead to data modification or information disclosure.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2272173, 2272174    
Bug Blocks:    

Description Mauro Matteo Cascella 2024-03-29 08:50:29 UTC
An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory.

References:
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md
https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/

Comment 1 Mauro Matteo Cascella 2024-03-29 08:50:44 UTC
Created mbedtls tracking bugs for this issue:

Affects: epel-8 [bug 2272173]
Affects: fedora-all [bug 2272174]