{"id":"CVE-2024-23775","details":"Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2, allows attackers to cause a denial of service (DoS) via mbedtls_x509_set_extension().","modified":"2026-03-15T13:45:11.719897Z","published":"2024-01-31T08:15:42.267Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GP5UU7Z6LJNBLBT4SC5WWS2HDNMTFZH5/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIBPEYSVRK4IFLBSYJAWKH33YBNH5HR2/"},{"type":"ADVISORY","url":"https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/armmbed/mbedtls","events":[{"introduced":"4cb87f409df0ddd878ea50cfca7dc8735ee574f2"},{"fixed":"555f84735aecdbd76a566cf087ec8425dfb0c8ab"},{"introduced":"8df2f8e7b9c7bb9390ac74bb7bace27edca81a2b"},{"fixed":"daca7a3979c22da155ec9dce49ab1abf3b65d3a9"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.28.7"},{"introduced":"3.0.0"},{"fixed":"3.5.2"}]}}],"versions":["beta-oob-2","mbedos-16.01-release","mbedos-16.03-release","mbedos-2016q1-oob1","mbedos-2016q1-oob2","mbedos-2016q1-oob3","mbedos-release-15-11","mbedos-techcon-oob2","mbedtls-2.0.0","mbedtls-2.1.0","mbedtls-2.1.1","mbedtls-2.1.2","mbedtls-2.10.0","mbedtls-2.11.0","mbedtls-2.12.0","mbedtls-2.13.0","mbedtls-2.13.1","mbedtls-2.14.0","mbedtls-2.15.0","mbedtls-2.15.1","mbedtls-2.16.0","mbedtls-2.17.0","mbedtls-2.18.0","mbedtls-2.19.0","mbedtls-2.19.0d1","mbedtls-2.19.0d2","mbedtls-2.19.1","mbedtls-2.2.0","mbedtls-2.2.1","mbedtls-2.20.0","mbedtls-2.20.0d0","mbedtls-2.20.0d1","mbedtls-2.21.0","mbedtls-2.22.0","mbedtls-2.22.0d0","mbedtls-2.23.0","mbedtls-2.24.0","mbedtls-2.25.0","mbedtls-2.26.0","mbedtls-2.27.0","mbedtls-2.28.0","mbedtls-2.28.1","mbedtls-2.28.2","mbedtls-2.28.3","mbedtls-2.28.4","mbedtls-2.28.5","mbedtls-2.28.6","mbedtls-2.3.0","mbedtls-2.4.0","mbedtls-2.5.0","mbedtls-2.5.1","mbedtls-2.6.0","mbedtls-2.6.0-rc1","mbedtls-2.7.0","mbedtls-2.7.0-rc1","mbedtls-2.8.0","mbedtls-2.8.0-rc1","mbedtls-2.9.0","mbedtls-3.0.0","mbedtls-3.1.0","mbedtls-3.2.0","mbedtls-3.2.1","mbedtls-3.3.0","mbedtls-3.4.0","mbedtls-3.4.1","mbedtls-3.5.0","mbedtls-3.5.1","v2.23.0","v2.24.0","v2.25.0","v2.26.0","v2.27.0","v2.28.0","v2.28.1","v2.28.2","v2.28.3","v2.28.4","v2.28.5","v2.28.6","v3.0.0","v3.1.0","v3.2.0","v3.2.1","v3.3.0","v3.4.0","v3.4.1","v3.5.0","v3.5.1","yotta-2.2.1","yotta-2.2.2","yotta-2.2.3","yotta-2.3.0","yotta-2.3.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-23775.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}