Fedora 42 update for mingw-python-flask, mingw-python-flit-core



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-47278
CWE-ID CWE-310
Exploitation vector Network
Public exploit N/A
Vulnerable software
Fedora
Operating systems & Components / Operating system

mingw-python-flit-core
Operating systems & Components / Operating system package or component

mingw-python-flask
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Cryptographic issues

EUVDB-ID: #VU109059

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-47278

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to the way fallback key configuration was handled. The application used the last fallback key for signing, rather than the current signing key, which could potentially lead to data tampering.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 42

mingw-python-flit-core: before 3.12.0-1.fc42

mingw-python-flask: before 3.1.1-1.fc42

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2025-853e37285c


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###