Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-66199

Опубликовано: 27 янв. 2026
Источник: ubuntu
Приоритет: low
CVSS3: 5.9

Описание

Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (bro...

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

not-affected

3.3.x+ only
esm-apps/xenial

not-affected

3.3.x+ only
esm-infra/focal

not-affected

3.3.x+ only
jammy

not-affected

3.3.x+ only
noble

needs-triage

plucky

ignored

end of life, was needs-triage
questing

needs-triage

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
jammy

needed

noble

not-affected

uses system openssl
plucky

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

needed

esm-infra-legacy/trusty

not-affected

3.3.x+ only
esm-infra/bionic

not-affected

3.3.x+ only
esm-infra/focal

not-affected

3.3.x+ only
esm-infra/xenial

not-affected

3.3.x+ only
fips-preview/jammy

not-affected

3.3.x+ only
fips-updates/bionic

not-affected

3.3.x+ only
fips-updates/focal

not-affected

3.3.x+ only
fips-updates/jammy

not-affected

3.3.x+ only
fips-updates/xenial

not-affected

3.3.x+ only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

3.3.x+ only
jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
8 дней назад

Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (bro

CVSS3: 5.9
debian
8 дней назад

Issue summary: A TLS 1.3 connection using certificate compression can ...

CVSS3: 5.9
github
8 дней назад

Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (...

rocky
5 дней назад

Important: openssl security update

oracle-oval
6 дней назад

ELSA-2026-50081: openssl security update (IMPORTANT)

5.9 Medium

CVSS3