CVE-2024-28836

NameCVE-2024-28836
DescriptionAn issue was discovered in Mbed TLS 3.5.x before 3.6.0. When negotiating the TLS version on the server side, it can fall back to the TLS 1.2 implementation of the protocol if it is disabled. If the TLS 1.2 implementation was disabled at build time, a TLS 1.2 client could put a TLS 1.3-only server into an infinite loop processing a TLS 1.2 ClientHello, resulting in a denial of service. If the TLS 1.2 implementation was disabled at runtime, a TLS 1.2 client can successfully establish a TLS 1.2 connection with the server.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mbedtls (PTS)bullseye2.16.9-0.1fixed
bookworm2.28.3-1fixed
sid, trixie2.28.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mbedtlssource(unstable)(not affected)

Notes

- mbedtls <not-affected> (Vulnerable code not enabled in any build which supports TLS 1.3)
https://github.com/Mbed-TLS/mbedtls/issues/8654
https://github.com/Mbed-TLS/mbedtls/commit/ad736991bb59211118a29fe115367c24495300c2 (mbedtls-3.6.0)
Experimental TLS 1.3 support not enabled in 2.x packages, TLS 1.3 is enabled
in Debian/experimental, but the first upload directly provides fixes, so mark
as <not-affected> altogether

Search for package or bug name: Reporting problems