An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Link | Tags |
---|---|
https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0 | third party advisory release notes |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9 | third party advisory release notes |
https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18 | third party advisory release notes |
https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html | third party advisory mailing list |