SB2025070784 - Fedora 42 update for mbedtls



SB2025070784 - Fedora 42 update for mbedtls

Published: July 7, 2025

Security Bulletin ID SB2025070784
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2025-52496)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to a race condition on x86 and amd64 systems that have the AESNI instruction, as it can be used for AES encryption and decryption. A remote attacker can extract AES keys from multithreaded programs and use them to decrypt traffic. 


2) Out-of-bounds read (CVE-ID: CVE-2025-52497)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when parsing invalid PEM-encrypted material in mbedtls_pk_parse_key(), mbedtls_pk_parse_keyfile() and mbedtls_pem_read_buffer() functions. A remote attacker can pass specially crafted data to the application, trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service attack.


3) Out-of-bounds read (CVE-ID: CVE-2025-49601)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in mbedtls_lms_import_public_key(). A remote attacker can pass specially crafted LMS public key to the application, trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service attack.


4) Unchecked Return Value (CVE-ID: CVE-2025-49600)

The vulnerability allows a remote attacker to bypass signature verification.

The vulnerability exists due to unchecked return value in mbedtls_lms_verify(). A remote attacker can bypass LMS signature verification process.


Remediation

Install update from vendor's website.