Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-27810 (GCVE-0-2025-27810)
Vulnerability from cvelistv5 – Published: 2025-03-25 00:00 – Updated: 2025-03-25 14:37
VLAI?
EPSS
Summary
Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
Severity ?
5.4 (Medium)
CWE
- CWE-908 - Use of Uninitialized Resource
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-27810",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-25T14:36:57.836676Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-25T14:37:14.294Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "mbedtls",
"vendor": "Mbed",
"versions": [
{
"lessThan": "2.28.10",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "3.6.3",
"status": "affected",
"version": "3.0.0",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mbed:mbedtls:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.28.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mbed:mbedtls:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.6.3",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-908",
"description": "CWE-908 Use of Uninitialized Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-25T05:46:03.559Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/Mbed-TLS/mbedtls/releases"
},
{
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-27810",
"datePublished": "2025-03-25T00:00:00.000Z",
"dateReserved": "2025-03-07T00:00:00.000Z",
"dateUpdated": "2025-03-25T14:37:14.294Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-27810",
"date": "2026-05-12",
"epss": "0.00158",
"percentile": "0.36246"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-27810\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-03-25T06:15:41.180\",\"lastModified\":\"2025-10-30T15:05:35.307\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.\"},{\"lang\":\"es\",\"value\":\"Mbed TLS anterior a 2.28.10 y 3.x anterior a 3.6.3, en algunos casos de asignaci\u00f3n de memoria fallida o errores de hardware, utiliza memoria de pila no inicializada para componer el mensaje TLS Finalizado, lo que puede provocar omisiones de autenticaci\u00f3n como repeticiones.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":2.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.28.10\",\"matchCriteriaId\":\"DD0A913D-2765-4EE6-8C44-59214EFCAD03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.6.3\",\"matchCriteriaId\":\"057D32FA-EAF0-4AFF-A003-C4C306BFCDA8\"}]}]}],\"references\":[{\"url\":\"https://github.com/Mbed-TLS/mbedtls/releases\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"product\": \"mbedtls\", \"vendor\": \"Mbed\", \"versions\": [{\"lessThan\": \"2.28.10\", \"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\"}, {\"lessThan\": \"3.6.3\", \"status\": \"affected\", \"version\": \"3.0.0\", \"versionType\": \"semver\"}]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.\"}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-908\", \"description\": \"CWE-908 Use of Uninitialized Resource\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-03-25T05:46:03.559Z\"}, \"references\": [{\"url\": \"https://github.com/Mbed-TLS/mbedtls/releases\"}, {\"url\": \"https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/\"}], \"x_generator\": {\"engine\": \"enrichogram 0.0.1\"}, \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N\"}}], \"cpeApplicability\": [{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mbed:mbedtls:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.28.10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mbed:mbedtls:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.0.0\", \"versionEndExcluding\": \"3.6.3\"}]}]}]}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-27810\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-25T14:36:57.836676Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-25T14:37:08.684Z\"}}]}",
"cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2025-27810\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"assignerShortName\": \"mitre\", \"dateUpdated\": \"2025-03-25T14:37:14.294Z\", \"dateReserved\": \"2025-03-07T00:00:00.000Z\", \"datePublished\": \"2025-03-25T00:00:00.000Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2025-27810
Vulnerability from fkie_nvd - Published: 2025-03-25 06:15 - Updated: 2025-10-30 15:05
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD0A913D-2765-4EE6-8C44-59214EFCAD03",
"versionEndExcluding": "2.28.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
"matchCriteriaId": "057D32FA-EAF0-4AFF-A003-C4C306BFCDA8",
"versionEndExcluding": "3.6.3",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays."
},
{
"lang": "es",
"value": "Mbed TLS anterior a 2.28.10 y 3.x anterior a 3.6.3, en algunos casos de asignaci\u00f3n de memoria fallida o errores de hardware, utiliza memoria de pila no inicializada para componer el mensaje TLS Finalizado, lo que puede provocar omisiones de autenticaci\u00f3n como repeticiones."
}
],
"id": "CVE-2025-27810",
"lastModified": "2025-10-30T15:05:35.307",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 2.7,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-03-25T06:15:41.180",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Mbed-TLS/mbedtls/releases"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-908"
}
],
"source": "cve@mitre.org",
"type": "Secondary"
}
]
}
BDU:2025-06868
Vulnerability from fstec - Published: 24.03.2025
VLAI Severity ?
Title
Уязвимость реализации протокола TLS программного обеспечения Mbed TLS, позволяющая нарушителю проводить атаки типа "человек по середине"
Description
Уязвимость реализации протокола TLS программного обеспечения Mbed TLS связана c использованием неинициализированного ресурса. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, проводить атаки типа "человек по середине"
Severity ?
Vendor
ООО «Ред Софт», ARM Limited
Software Name
РЕД ОС (запись в едином реестре российских программ №3751), Mbed TLS
Software Version
7.3 (РЕД ОС), до 3.6.3 (Mbed TLS), до 2.28.10 (Mbed TLS)
Possible Mitigations
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Mbed TLS:
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Reference
https://github.com/Mbed-TLS/mbedtls/releases
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
CWE
CWE-908
{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, ARM Limited",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), \u0434\u043e 3.6.3 (Mbed TLS), \u0434\u043e 2.28.10 (Mbed TLS)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Mbed TLS:\nhttps://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "24.03.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.06.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-06868",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-27810",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Mbed TLS",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 TLS \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Mbed TLS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u0442\u0438\u043f\u0430 \"\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\"",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0435\u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (CWE-908)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 TLS \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Mbed TLS \u0441\u0432\u044f\u0437\u0430\u043d\u0430 c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u0442\u0438\u043f\u0430 \"\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\"",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/Mbed-TLS/mbedtls/releases\t\nhttps://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-908",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)"
}
MSRC_CVE-2025-27810
Vulnerability from csaf_microsoft - Published: 2025-03-02 00:00 - Updated: 2026-02-18 03:06Summary
Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
CWE-908
- Use of Uninitialized Resource
Affected products
Known not affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17086-1 | — | ||
| Unresolved product id: 17086-3 | — | ||
| Unresolved product id: 17084-2 | — |
References
4 references
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27810 Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-27810.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.",
"tracking": {
"current_release_date": "2026-02-18T03:06:46.000Z",
"generator": {
"date": "2026-02-18T15:05:13.447Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-27810",
"initial_release_date": "2025-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-09-03T22:17:37.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-02-18T03:06:46.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"category": "product_name",
"name": "cbl2 qemu 6.2.0-24",
"product": {
"name": "cbl2 qemu 6.2.0-24",
"product_id": "1"
}
},
{
"category": "product_name",
"name": "cbl2 qemu 6.2.0-24",
"product": {
"name": "cbl2 qemu 6.2.0-24",
"product_id": "3"
}
},
{
"category": "product_name",
"name": "azl3 qemu 8.2.0-16",
"product": {
"name": "azl3 qemu 8.2.0-16",
"product_id": "2"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 qemu 6.2.0-24 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 qemu 6.2.0-24 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 qemu 8.2.0-16 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-27810",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-2"
]
},
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17086-1",
"17086-3"
]
}
],
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"known_not_affected": [
"17086-1",
"17086-3",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27810 Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-27810.json"
}
],
"title": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays."
}
]
}
OPENSUSE-SU-2025:14928-1
Vulnerability from csaf_opensuse - Published: 2025-03-25 00:00 - Updated: 2025-03-25 00:00Summary
libmbedcrypto7-2.28.10-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: libmbedcrypto7-2.28.10-1.1 on GA media
Description of the patch: These are all security issues fixed in the libmbedcrypto7-2.28.10-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-14928
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.8 (Medium)
Affected products
Recommended
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
10 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libmbedcrypto7-2.28.10-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libmbedcrypto7-2.28.10-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14928",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14928-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14928-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEXH3S4RBK73QBEEJ7JPT75BI5G4JFKE/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14928-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEXH3S4RBK73QBEEJ7JPT75BI5G4JFKE/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27809 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27810 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27810/"
}
],
"title": "libmbedcrypto7-2.28.10-1.1 on GA media",
"tracking": {
"current_release_date": "2025-03-25T00:00:00Z",
"generator": {
"date": "2025-03-25T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14928-1",
"initial_release_date": "2025-03-25T00:00:00Z",
"revision_history": [
{
"date": "2025-03-25T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libmbedcrypto7-2.28.10-1.1.aarch64",
"product": {
"name": "libmbedcrypto7-2.28.10-1.1.aarch64",
"product_id": "libmbedcrypto7-2.28.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64",
"product": {
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64",
"product_id": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedtls14-2.28.10-1.1.aarch64",
"product": {
"name": "libmbedtls14-2.28.10-1.1.aarch64",
"product_id": "libmbedtls14-2.28.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64",
"product": {
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64",
"product_id": "libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-2.28.10-1.1.aarch64",
"product": {
"name": "libmbedx509-1-2.28.10-1.1.aarch64",
"product_id": "libmbedx509-1-2.28.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64",
"product": {
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64",
"product_id": "libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mbedtls-2-devel-2.28.10-1.1.aarch64",
"product": {
"name": "mbedtls-2-devel-2.28.10-1.1.aarch64",
"product_id": "mbedtls-2-devel-2.28.10-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedcrypto7-2.28.10-1.1.ppc64le",
"product": {
"name": "libmbedcrypto7-2.28.10-1.1.ppc64le",
"product_id": "libmbedcrypto7-2.28.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le",
"product": {
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le",
"product_id": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedtls14-2.28.10-1.1.ppc64le",
"product": {
"name": "libmbedtls14-2.28.10-1.1.ppc64le",
"product_id": "libmbedtls14-2.28.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le",
"product": {
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le",
"product_id": "libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-2.28.10-1.1.ppc64le",
"product": {
"name": "libmbedx509-1-2.28.10-1.1.ppc64le",
"product_id": "libmbedx509-1-2.28.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le",
"product": {
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le",
"product_id": "libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mbedtls-2-devel-2.28.10-1.1.ppc64le",
"product": {
"name": "mbedtls-2-devel-2.28.10-1.1.ppc64le",
"product_id": "mbedtls-2-devel-2.28.10-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedcrypto7-2.28.10-1.1.s390x",
"product": {
"name": "libmbedcrypto7-2.28.10-1.1.s390x",
"product_id": "libmbedcrypto7-2.28.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x",
"product": {
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x",
"product_id": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmbedtls14-2.28.10-1.1.s390x",
"product": {
"name": "libmbedtls14-2.28.10-1.1.s390x",
"product_id": "libmbedtls14-2.28.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.s390x",
"product": {
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.s390x",
"product_id": "libmbedtls14-x86-64-v3-2.28.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-2.28.10-1.1.s390x",
"product": {
"name": "libmbedx509-1-2.28.10-1.1.s390x",
"product_id": "libmbedx509-1-2.28.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x",
"product": {
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x",
"product_id": "libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mbedtls-2-devel-2.28.10-1.1.s390x",
"product": {
"name": "mbedtls-2-devel-2.28.10-1.1.s390x",
"product_id": "mbedtls-2-devel-2.28.10-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libmbedcrypto7-2.28.10-1.1.x86_64",
"product": {
"name": "libmbedcrypto7-2.28.10-1.1.x86_64",
"product_id": "libmbedcrypto7-2.28.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64",
"product": {
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64",
"product_id": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedtls14-2.28.10-1.1.x86_64",
"product": {
"name": "libmbedtls14-2.28.10-1.1.x86_64",
"product_id": "libmbedtls14-2.28.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64",
"product": {
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64",
"product_id": "libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-2.28.10-1.1.x86_64",
"product": {
"name": "libmbedx509-1-2.28.10-1.1.x86_64",
"product_id": "libmbedx509-1-2.28.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64",
"product": {
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64",
"product_id": "libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mbedtls-2-devel-2.28.10-1.1.x86_64",
"product": {
"name": "mbedtls-2-devel-2.28.10-1.1.x86_64",
"product_id": "mbedtls-2-devel-2.28.10-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-2.28.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.aarch64"
},
"product_reference": "libmbedcrypto7-2.28.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-2.28.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.ppc64le"
},
"product_reference": "libmbedcrypto7-2.28.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-2.28.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.s390x"
},
"product_reference": "libmbedcrypto7-2.28.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-2.28.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.x86_64"
},
"product_reference": "libmbedcrypto7-2.28.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64"
},
"product_reference": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le"
},
"product_reference": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x"
},
"product_reference": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64"
},
"product_reference": "libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls14-2.28.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.aarch64"
},
"product_reference": "libmbedtls14-2.28.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls14-2.28.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.ppc64le"
},
"product_reference": "libmbedtls14-2.28.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls14-2.28.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.s390x"
},
"product_reference": "libmbedtls14-2.28.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls14-2.28.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.x86_64"
},
"product_reference": "libmbedtls14-2.28.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64"
},
"product_reference": "libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le"
},
"product_reference": "libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.s390x"
},
"product_reference": "libmbedtls14-x86-64-v3-2.28.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64"
},
"product_reference": "libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-2.28.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.aarch64"
},
"product_reference": "libmbedx509-1-2.28.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-2.28.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.ppc64le"
},
"product_reference": "libmbedx509-1-2.28.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-2.28.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.s390x"
},
"product_reference": "libmbedx509-1-2.28.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-2.28.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.x86_64"
},
"product_reference": "libmbedx509-1-2.28.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64"
},
"product_reference": "libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le"
},
"product_reference": "libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x"
},
"product_reference": "libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64"
},
"product_reference": "libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-2-devel-2.28.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.aarch64"
},
"product_reference": "mbedtls-2-devel-2.28.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-2-devel-2.28.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.ppc64le"
},
"product_reference": "mbedtls-2-devel-2.28.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-2-devel-2.28.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.s390x"
},
"product_reference": "mbedtls-2-devel-2.28.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mbedtls-2-devel-2.28.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.x86_64"
},
"product_reference": "mbedtls-2-devel-2.28.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-27809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27809"
}
],
"notes": [
{
"category": "general",
"text": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted certificates for arbitrary hostnames unless the TLS client application calls mbedtls_ssl_set_hostname.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27809",
"url": "https://www.suse.com/security/cve/CVE-2025-27809"
},
{
"category": "external",
"summary": "SUSE Bug 1240051 for CVE-2025-27809",
"url": "https://bugzilla.suse.com/1240051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-27809"
},
{
"cve": "CVE-2025-27810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27810"
}
],
"notes": [
{
"category": "general",
"text": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27810",
"url": "https://www.suse.com/security/cve/CVE-2025-27810"
},
{
"category": "external",
"summary": "SUSE Bug 1240052 for CVE-2025-27810",
"url": "https://bugzilla.suse.com/1240052"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedcrypto7-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedtls14-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:libmbedx509-1-x86-64-v3-2.28.10-1.1.x86_64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.aarch64",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.ppc64le",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.s390x",
"openSUSE Tumbleweed:mbedtls-2-devel-2.28.10-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-27810"
}
]
}
GHSA-VVQM-MMW4-QWG5
Vulnerability from github – Published: 2025-03-25 06:30 – Updated: 2025-03-25 06:30
VLAI?
Details
Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
Severity ?
5.4 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-27810"
],
"database_specific": {
"cwe_ids": [
"CWE-908"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-25T06:15:41Z",
"severity": "MODERATE"
},
"details": "Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.",
"id": "GHSA-vvqm-mmw4-qwg5",
"modified": "2025-03-25T06:30:28Z",
"published": "2025-03-25T06:30:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27810"
},
{
"type": "WEB",
"url": "https://github.com/Mbed-TLS/mbedtls/releases"
},
{
"type": "WEB",
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…