Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-9230

Опубликовано: 30 сент. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 7.5

Описание

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.

РелизСтатусПримечание
devel

not-affected

code not compiled
esm-apps/bionic

not-affected

code not compiled
esm-apps/xenial

not-affected

code not compiled
esm-infra/focal

not-affected

code not compiled
jammy

not-affected

code not compiled
noble

not-affected

code not compiled
plucky

not-affected

code not compiled
questing

not-affected

code not compiled
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
jammy

needed

noble

not-affected

uses system openssl
plucky

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

released

3.5.3-1ubuntu2
esm-infra-legacy/trusty

released

1.0.1f-1ubuntu2.27+esm11
esm-infra/bionic

released

1.1.1-1ubuntu2.1~18.04.23+esm6
esm-infra/focal

released

1.1.1f-1ubuntu2.24+esm1
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm13
fips-preview/jammy

needed

fips-updates/bionic

needed

fips-updates/focal

released

1.1.1f-1ubuntu2.fips.24.1
fips-updates/jammy

released

3.0.2-0ubuntu1.20+Fips1
fips-updates/xenial

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

released

1.0.2n-1ubuntu5.13+esm2
jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
15 дней назад

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.

CVSS3: 7.5
debian
15 дней назад

Issue summary: An application trying to decrypt CMS messages encrypted ...

suse-cvrf
6 дней назад

Security update for openssl-1_1-livepatches

suse-cvrf
9 дней назад

Security update for openssl-1_0_0

suse-cvrf
9 дней назад

Security update for openssl-1_1

7.5 High

CVSS3