CVE-2025-27809

NameCVE-2025-27809
DescriptionMbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted certificates for arbitrary hostnames unless the TLS client application calls mbedtls_ssl_set_hostname.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1101499

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mbedtls (PTS)bullseye2.16.9-0.1vulnerable
bullseye (security)2.16.9-0.1+deb11u3vulnerable
bookworm2.28.3-1vulnerable
forky, sid, trixie3.6.4-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mbedtlssource(unstable)3.6.3-11101499

Notes

[bookworm] - mbedtls <no-dsa> (Minor issue)
[bullseye] - mbedtls <ignored> (Too disruptive for rdeps if backported)
https://github.com/Mbed-TLS/mbedtls/issues/466
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-1/
https://github.com/Mbed-TLS/mbedtls/commit/9a9f0c77cfd314b761aaeef7a521565e00019b4a (mbedtls-3.6.3)
https://github.com/Mbed-TLS/mbedtls/commit/c43a9d5576c3f9b9da21454711c104b1f9d73efa (mbedtls-2.28.10)

Search for package or bug name: Reporting problems