Open mend-bolt-for-github[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2021-44732 - Critical Severity Vulnerability
Vulnerable Library - godot3.4.2-stable
Godot Engine ? Multi-platform 2D and 3D game engine
Library home page: https://github.com/godotengine/godot.git
Found in HEAD commit: e6580209fab1312cb824a455d2df99df8a9fb156
Found in base branch: main
Vulnerable Source Files (1)
/thirdparty/mbedtls/library/ssl_tls.c
Vulnerability Details
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.
Publish Date: 2021-12-20
URL: CVE-2021-44732
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://bugs.gentoo.org/829660#c4
Release Date: 2021-12-20
Fix Resolution: mbedtls-2.16.12,mbedtls-2.28.0,mbedtls-3.1.0,v2.16.12,v2.28.0,v3.1.0
Step up your Open Source Security Game with Mend here