CVE-2025-47917

Mbed TLS before 3.6.4 allows a use-after-free in certain situations of applications that are developed in accordance with the documentation. The function mbedtls_x509_string_to_names() takes a head argument that is documented as an output argument. The documentation does not suggest that the function will free that pointer; however, the function does call mbedtls_asn1_free_named_data_list() on that argument, which performs a deep free(). As a result, application code that uses this function (relying only on documented behavior) is likely to still hold pointers to the memory blocks that were freed, resulting in a high risk of use-after-free or double-free. In particular, the two sample programs x509/cert_write and x509/cert_req are affected (use-after-free if the san string contains more than one DN).
Configurations

Configuration 1 (hide)

cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*

History

07 Aug 2025, 01:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ - () https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/ - Vendor Advisory
References () https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md - () https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-7.md - Third Party Advisory, Mitigation
First Time Arm
Arm mbed Tls
CPE cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*

20 Jul 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-20 19:15

Updated : 2025-08-07 01:18


NVD link : CVE-2025-47917

Mitre link : CVE-2025-47917


JSON object : View

Products Affected

arm

  • mbed_tls
CWE
CWE-416

Use After Free