Bug 2376427 (CVE-2025-49601) - CVE-2025-49601 mbedtls: MbedTLS LMS Public Key Out-of-Bounds Read
Summary: CVE-2025-49601 mbedtls: MbedTLS LMS Public Key Out-of-Bounds Read
Keywords:
Status: NEW
Alias: CVE-2025-49601
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2376707 2376710 2376706 2376708 2376709
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-04 15:01 UTC by OSIDB Bzimport
Modified: 2025-07-07 13:40 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-07-04 15:01:33 UTC
In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.


Note You need to log in before you can comment on or make changes to this bug.