Bug 2454264 (CVE-2026-5244) - CVE-2026-5244 mongoose: heap-based buffer overflow in the TLS 1.3 implementation
Summary: CVE-2026-5244 mongoose: heap-based buffer overflow in the TLS 1.3 implementation
Keywords:
Status: NEW
Alias: CVE-2026-5244
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2454329 2454330 2454331 2454332
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-02 09:02 UTC by OSIDB Bzimport
Modified: 2026-04-02 13:23 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-02 09:02:28 UTC
A vulnerability has been found in Cesanta Mongoose up to 7.20. This affects the function mg_tls_recv_cert of the file mongoose.c of the component TLS 1.3 Handler. Such manipulation of the argument pubkey leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.21 mitigates this issue. The name of the patch is 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.


Note You need to log in before you can comment on or make changes to this bug.