Integer Overflow or Wraparound Affecting mbedtls package, versions *
Threat Intelligence
EPSS
0.05% (22nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-MBEDTLS-6208101
- published 28 Jan 2024
- disclosed 31 Jan 2024
Introduced: 28 Jan 2024
CVE-2024-23775 Open this link in a new tabHow to fix?
There is no fixed version for Debian:11 mbedtls.
NVD Description
Note: Versions mentioned in the description apply only to the upstream mbedtls package and not the mbedtls package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2, allows attackers to cause a denial of service (DoS) via mbedtls_x509_set_extension().
References
- https://security-tracker.debian.org/tracker/CVE-2024-23775
- https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5/
CVSS Scores
version 3.1