JLSEC-2025-203

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-203.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-203.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2025-203
Upstream
Published
2025-11-21T15:59:04.054Z
Modified
2025-11-21T16:17:57.459281Z
Summary
In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows...
Details

In Trusted Firmware Mbed TLS 2.24.0, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "imported": "2025-11-20T23:04:00.269Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-24119",
            "modified": "2025-11-03T20:15:45.783Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24119",
            "id": "CVE-2021-24119",
            "published": "2021-07-14T13:15:08.100Z"
        }
    ]
}
References

Affected packages

Julia / MbedTLS_jll

Package

Name
MbedTLS_jll
Purl
pkg:julia/MbedTLS_jll?uuid=c8ffd9c3-330d-5841-b78e-0817d7145fa1

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.26.0+0