Bug 2272172 (CVE-2024-28960) - CVE-2024-28960 mbedtls: Insecure handling of shared memory in PSA Crypto APIs
Summary: CVE-2024-28960 mbedtls: Insecure handling of shared memory in PSA Crypto APIs
Keywords:
Status: NEW
Alias: CVE-2024-28960
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2272173 2272174
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-03-29 08:50 UTC by Mauro Matteo Cascella
Modified: 2024-03-29 08:50 UTC (History)
0 users

Fixed In Version: mbedtls 2.28.8
Doc Type: ---
Doc Text:
A flaw was found in Mbed TLS. When a function takes parameters in memory that is shared with another protection domain (process, partition, etc.) that is untrusted, the untrusted domain can access the shared memory during the execution of the function, which can compromise various security properties and lead to data modification or information disclosure.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2024-03-29 08:50:29 UTC
An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory.

References:
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md
https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/

Comment 1 Mauro Matteo Cascella 2024-03-29 08:50:44 UTC
Created mbedtls tracking bugs for this issue:

Affects: epel-8 [bug 2272173]
Affects: fedora-all [bug 2272174]


Note You need to log in before you can comment on or make changes to this bug.