Your message dated Sun, 13 Jul 2025 11:34:46 +0000
with message-id <e1uauyk-003fh4...@fasolo.debian.org>
and subject line Bug#1108786: fixed in mbedtls 3.6.4-1
has caused the Debian Bug report #1108786,
regarding mbedtls: CVE-2025-52497: Heap buffer under-read when parsing
PEM-encrypted material
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1108786: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108786
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: mbedtls
Version: 3.6.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi,
The following vulnerability was published for mbedtls.
CVE-2025-52497[0]:
| Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer
| underflow, in mbedtls_pem_read_buffer and two mbedtls_pk_parse
| functions, via untrusted PEM input.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-52497
https://www.cve.org/CVERecord?id=CVE-2025-52497
[1]
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-2.md
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: mbedtls
Source-Version: 3.6.4-1
Done: Andrea Pappacoda <ta...@debian.org>
We believe that the bug you reported is fixed in the latest version of
mbedtls, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1108...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andrea Pappacoda <ta...@debian.org> (supplier of updated mbedtls package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 13 Jul 2025 13:26:04 +0200
Source: mbedtls
Architecture: source
Version: 3.6.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian IoT Maintainers
<debian-iot-maintain...@alioth-lists.debian.net>
Changed-By: Andrea Pappacoda <ta...@debian.org>
Closes: 1108785 1108786 1108787 1108788
Changes:
mbedtls (3.6.4-1) unstable; urgency=medium
.
* New upstream version 3.6.4
- Closes: #1108785 (CVE-2025-52496)
- Closes: #1108786 (CVE-2025-52497)
- Closes: #1108787 (CVE-2025-49600)
- Closes: #1108788 (CVE-2025-49601)
Checksums-Sha1:
b864f90e15d92ed39519a2f9e049b96b08195eb8 1981 mbedtls_3.6.4-1.dsc
b9c9035d108bacb6a0273dc31639fcf6d77a1e7b 5099459 mbedtls_3.6.4.orig.tar.bz2
0f6b8e9649f95fa5464d30d1e256d9fd7f104dfe 18636 mbedtls_3.6.4-1.debian.tar.xz
Checksums-Sha256:
d886a94bf35951bf87f2bba6b19fc04f0138af4b43ac9ffa76e2b7b148a8c031 1981
mbedtls_3.6.4-1.dsc
ec35b18a6c593cf98c3e30db8b98ff93e8940a8c4e690e66b41dfc011d678110 5099459
mbedtls_3.6.4.orig.tar.bz2
a20ec6f4ff606fe803a594a7cff2eb8a0c821263c0bdf094d097d7451b97755c 18636
mbedtls_3.6.4-1.debian.tar.xz
Files:
ade05ef307c6e9a99f5a1d61583fbd34 1981 libs optional mbedtls_3.6.4-1.dsc
eb965a5bb8044bc43a49adb435fa72ee 5099459 libs optional
mbedtls_3.6.4.orig.tar.bz2
165fc0f76e6b34ce4c07f4fed13661d8 18636 libs optional
mbedtls_3.6.4-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iIcEARYKAC8WIQS6VuNIvZRFHt7JcAdKkgiiRVB3pwUCaHOZSREcdGFjaGlAZGVi
aWFuLm9yZwAKCRBKkgiiRVB3p9TAAQDK98m5VpNZuNnF2FRldEnl59MaYTwXGY0K
NGXjA8ysbQEAxDzqgUsGYDzMrF16D2eAa8SJBE21BwjExeblXv/BkgY=
=PVU3
-----END PGP SIGNATURE-----
pgpy4ZG_HOH2k.pgp
Description: PGP signature
--- End Message ---