{"id":"CVE-2022-46393","details":"An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX \u003e 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.","modified":"2026-04-02T08:28:16.667736Z","published":"2022-12-15T23:15:10.570Z","related":["openSUSE-SU-2022:10257-1","openSUSE-SU-2024:12581-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/"},{"type":"ADVISORY","url":"https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"},{"type":"ADVISORY","url":"https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2"},{"type":"ADVISORY","url":"https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"0"},{"fixed":"89f040a5c938985c5f30728baed21e49d0846a53"},{"introduced":"8df2f8e7b9c7bb9390ac74bb7bace27edca81a2b"},{"fixed":"8c89224991adff88d53cd380f42a2baa36f91454"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.28.2"},{"introduced":"3.0.0"},{"fixed":"3.3.0"}]}},{"type":"GIT","repo":"https://github.com/mbed-tls/mbedtls","events":[{"introduced":"0"},{"fixed":"89f040a5c938985c5f30728baed21e49d0846a53"},{"fixed":"8c89224991adff88d53cd380f42a2baa36f91454"}]}],"versions":["beta-oob-2","beta-release","feature-opaque-keys-2.7-rc1","list","mbed-alpha3","mbed-os-beta","mbedos-16.01-release","mbedos-16.03-release","mbedos-2016q1-oob1","mbedos-2016q1-oob2","mbedos-2016q1-oob3","mbedos-release-15-11","mbedos-techcon-oob2","mbedtls-1.3.10","mbedtls-1.3.11","mbedtls-1.3.12","mbedtls-1.3.13","mbedtls-1.3.14","mbedtls-1.3.15","mbedtls-1.3.16","mbedtls-1.3.17","mbedtls-1.3.18","mbedtls-1.3.19","mbedtls-1.3.19-rc1","mbedtls-1.3.20","mbedtls-1.3.21","mbedtls-1.3.21-rc1","mbedtls-1.3.22","mbedtls-1.3.22-rc1","mbedtls-1.4-dtls-preview","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.10","mbedtls-2.1.10-rc1","mbedtls-2.1.11","mbedtls-2.1.11-rc1","mbedtls-2.1.12","mbedtls-2.1.13","mbedtls-2.1.14","mbedtls-2.1.15","mbedtls-2.1.16","mbedtls-2.1.17","mbedtls-2.1.18","mbedtls-2.1.2","mbedtls-2.1.3","mbedtls-2.1.4","mbedtls-2.1.5","mbedtls-2.1.6","mbedtls-2.1.7","mbedtls-2.1.7-rc1","mbedtls-2.1.8","mbedtls-2.1.9","mbedtls-2.1.9-rc1","mbedtls-2.10.0","mbedtls-2.11.0","mbedtls-2.12.0","mbedtls-2.13.0","mbedtls-2.13.1","mbedtls-2.14.0","mbedtls-2.14.1","mbedtls-2.15.0","mbedtls-2.15.1","mbedtls-2.16.0","mbedtls-2.16.1","mbedtls-2.16.10","mbedtls-2.16.11","mbedtls-2.16.12","mbedtls-2.16.2","mbedtls-2.16.3","mbedtls-2.16.4","mbedtls-2.16.5","mbedtls-2.16.6","mbedtls-2.16.7","mbedtls-2.16.8","mbedtls-2.16.9","mbedtls-2.17.0","mbedtls-2.18.0","mbedtls-2.18.1","mbedtls-2.19.0","mbedtls-2.19.0d1","mbedtls-2.19.0d2","mbedtls-2.19.1","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.20.0","mbedtls-2.20.0d0","mbedtls-2.20.0d1","mbedtls-2.21.0","mbedtls-2.22.0","mbedtls-2.22.0d0","mbedtls-2.23.0","mbedtls-2.24.0","mbedtls-2.25.0","mbedtls-2.26.0","mbedtls-2.27.0","mbedtls-2.28.0","mbedtls-2.28.1","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.4.1","mbedtls-2.4.2","mbedtls-2.4.2-rc1","mbedtls-2.5.0","mbedtls-2.5.0-rc1","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.6.1","mbedtls-2.6.1-rc1","mbedtls-2.7.0","mbedtls-2.7.0-rc1","mbedtls-2.7.1","mbedtls-2.7.10","mbedtls-2.7.11","mbedtls-2.7.12","mbedtls-2.7.13","mbedtls-2.7.14","mbedtls-2.7.15","mbedtls-2.7.16","mbedtls-2.7.17","mbedtls-2.7.18","mbedtls-2.7.19","mbedtls-2.7.2","mbedtls-2.7.2-rc1","mbedtls-2.7.3","mbedtls-2.7.4","mbedtls-2.7.5","mbedtls-2.7.6","mbedtls-2.7.7","mbedtls-2.7.8","mbedtls-2.7.9","mbedtls-2.8.0","mbedtls-2.8.0-rc1","mbedtls-2.9.0","mbedtls-3.0.0","mbedtls-3.0.0p1","mbedtls-3.1.0","mbedtls-3.2.0","mbedtls-3.2.1","polarssl-0.10.0","polarssl-0.10.1","polarssl-0.11.0","polarssl-0.11.1","polarssl-0.12.0","polarssl-0.12.1","polarssl-0.13.0","polarssl-0.13.1","polarssl-0.14.0","polarssl-0.14.1","polarssl-0.14.2","polarssl-0.14.3","polarssl-0.99-pre1","polarssl-0.99-pre2","polarssl-0.99-pre3","polarssl-0.99-pre4","polarssl-0.99-pre5","polarssl-1.0.0","polarssl-1.1.0","polarssl-1.1.0-rc0","polarssl-1.1.0-rc1","polarssl-1.1.1","polarssl-1.1.2","polarssl-1.1.3","polarssl-1.1.4","polarssl-1.1.5","polarssl-1.1.6","polarssl-1.1.7","polarssl-1.1.8","polarssl-1.2.0","polarssl-1.2.0-pre1","polarssl-1.2.1","polarssl-1.2.10","polarssl-1.2.11","polarssl-1.2.12","polarssl-1.2.13","polarssl-1.2.14","polarssl-1.2.15","polarssl-1.2.16","polarssl-1.2.17","polarssl-1.2.18","polarssl-1.2.19","polarssl-1.2.2","polarssl-1.2.3","polarssl-1.2.4","polarssl-1.2.5","polarssl-1.2.6","polarssl-1.2.7","polarssl-1.2.8","polarssl-1.2.9","polarssl-1.3-alpha1","polarssl-1.3.0","polarssl-1.3.0-rc0","polarssl-1.3.1","polarssl-1.3.2","polarssl-1.3.3","polarssl-1.3.4","polarssl-1.3.5","polarssl-1.3.6","polarssl-1.3.7","polarssl-1.3.8","polarssl-1.3.9","v2.16.10","v2.16.11","v2.16.12","v2.16.7","v2.16.8","v2.16.9","v2.23.0","v2.24.0","v2.25.0","v2.26.0","v2.27.0","v2.28.0","v2.28.1","v2.7.16","v2.7.17","v2.7.18","v2.7.19","v3.0.0","v3.1.0","v3.2.0","v3.2.1","yotta-2.2.1","yotta-2.2.2","yotta-2.2.3","yotta-2.3.0","yotta-2.3.1","yotta-2.3.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-46393.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}