Логотип exploitDog
bind:"BDU:2026-01216" OR bind:"CVE-2025-68160"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2026-01216" OR bind:"CVE-2025-68160"

Количество 23

Количество 23

fstec логотип

BDU:2026-01216

2 месяца назад

Уязвимость функции BIO_f_linebuffer() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2025-68160

14 дней назад

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an...

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2025-68160

14 дней назад

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2025-68160

14 дней назад

Issue summary: Writing large, newline-free data into a BIO chain using ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-g78j-46j5-97cr

14 дней назад

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3...

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0333-1

12 дней назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0332-1

12 дней назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0360-1

8 дней назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0359-1

8 дней назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0358-1

8 дней назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0346-1

11 дней назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0331-1

13 дней назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0312-1

13 дней назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0311-1

13 дней назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0310-1

13 дней назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0309-1

13 дней назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20152-1

8 дней назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2026:1472

11 дней назад

Important: openssl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50081

11 дней назад

ELSA-2026-50081: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50080

11 дней назад

ELSA-2026-50080: openssl security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2026-01216

Уязвимость функции BIO_f_linebuffer() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.7
0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2025-68160

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an...

CVSS3: 4.7
0%
Низкий
14 дней назад
nvd логотип
CVE-2025-68160

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an

CVSS3: 4.7
0%
Низкий
14 дней назад
debian логотип
CVE-2025-68160

Issue summary: Writing large, newline-free data into a BIO chain using ...

CVSS3: 4.7
0%
Низкий
14 дней назад
github логотип
GHSA-g78j-46j5-97cr

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3...

CVSS3: 4.7
0%
Низкий
14 дней назад
suse-cvrf логотип
SUSE-SU-2026:0333-1

Security update for openssl-1_0_0

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0332-1

Security update for openssl-1_0_0

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0360-1

Security update for openssl-1_1

8 дней назад
suse-cvrf логотип
SUSE-SU-2026:0359-1

Security update for openssl-1_1

8 дней назад
suse-cvrf логотип
SUSE-SU-2026:0358-1

Security update for openssl-1_1

8 дней назад
suse-cvrf логотип
SUSE-SU-2026:0346-1

Security update for openssl-1_1

11 дней назад
suse-cvrf логотип
SUSE-SU-2026:0331-1

Security update for openssl-1_1

13 дней назад
suse-cvrf логотип
SUSE-SU-2026:0312-1

Security update for openssl-3

13 дней назад
suse-cvrf логотип
SUSE-SU-2026:0311-1

Security update for openssl-3

13 дней назад
suse-cvrf логотип
SUSE-SU-2026:0310-1

Security update for openssl-3

13 дней назад
suse-cvrf логотип
SUSE-SU-2026:0309-1

Security update for openssl-3

13 дней назад
suse-cvrf логотип
openSUSE-SU-2026:20152-1

Security update for openssl-3

8 дней назад
rocky логотип
RLSA-2026:1472

Important: openssl security update

11 дней назад
oracle-oval логотип
ELSA-2026-50081

ELSA-2026-50081: openssl security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-50080

ELSA-2026-50080: openssl security update (IMPORTANT)

11 дней назад

Уязвимостей на страницу