CVE-2025-49601

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-49601
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-49601.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-49601
Downstream
Published
2025-07-04T15:15:22Z
Modified
2025-07-08T16:50:55.677372Z
Summary
[none]
Details

In MbedTLS 3.3.0 before 3.6.4, mbedtlslmsimportpublickey does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtlslmsimportpublickey allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtlslmsimportpublickey reads this type indicator before validating the size of its input.

References

Affected packages

Debian:13 / mbedtls

Package

Name
mbedtls
Purl
pkg:deb/debian/mbedtls?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.28.3-1
2.28.4-1
2.28.5-1
2.28.6-1
2.28.7-1
2.28.7-1.1~exp1
2.28.7-1.1
2.28.8-1

3.*

3.6.0-1
3.6.0-2
3.6.0-3
3.6.2-1
3.6.2-2
3.6.2-3
3.6.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}