Mbed TLS 2.x before 2.28.5 and 3.x before 3.5.0 has a Buffer Overflow.
References
Configurations
History
21 Nov 2024, 08:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BDSHAANRULB57GVS5B3DZHXL5KCC7OWQ/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGRB5MO2KUJKYPMGXMIZH2WRH6QR5UZS/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7SB7L6A56QZALDTOZ6O4X7PTC4I647R/ - Mailing List | |
References | () https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/ - Mitigation, Vendor Advisory |
Information
Published : 2023-10-07 01:15
Updated : 2024-11-21 08:24
NVD link : CVE-2023-43615
Mitre link : CVE-2023-43615
CVE.ORG link : CVE-2023-43615
JSON object : View
Products Affected
arm
- mbed_tls
fedoraproject
- fedora
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')