Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).
References
Link | Resource |
---|---|
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md | Third Party Advisory Mitigation |
https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ | Vendor Advisory |
Configurations
History
07 Aug 2025, 01:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:* | |
First Time |
Arm mbed Tls
Arm |
|
References | () https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md - Third Party Advisory, Mitigation | |
References | () https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ - Vendor Advisory |
22 Jul 2025, 13:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Jul 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-20 19:15
Updated : 2025-08-07 01:18
NVD link : CVE-2025-47917
Mitre link : CVE-2025-47917
CVE.ORG link : CVE-2025-47917
JSON object : View
Products Affected
arm
- mbed_tls
CWE
CWE-416
Use After Free