Количество 26
Количество 26
GHSA-g78j-46j5-97cr
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3...
CVE-2025-68160
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an...
CVE-2025-68160
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an...
CVE-2025-68160
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an
CVE-2025-68160
Issue summary: Writing large, newline-free data into a BIO chain using ...
BDU:2026-01216
Уязвимость функции BIO_f_linebuffer() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2026:0498-1
Security update for openssl1
SUSE-SU-2026:0333-1
Security update for openssl-1_0_0
SUSE-SU-2026:0332-1
Security update for openssl-1_0_0
SUSE-SU-2026:0360-1
Security update for openssl-1_1
SUSE-SU-2026:0359-1
Security update for openssl-1_1
SUSE-SU-2026:0358-1
Security update for openssl-1_1
SUSE-SU-2026:0346-1
Security update for openssl-1_1
SUSE-SU-2026:0331-1
Security update for openssl-1_1
SUSE-SU-2026:0312-1
Security update for openssl-3
SUSE-SU-2026:0311-1
Security update for openssl-3
SUSE-SU-2026:0310-1
Security update for openssl-3
SUSE-SU-2026:0309-1
Security update for openssl-3
openSUSE-SU-2026:20152-1
Security update for openssl-3
RLSA-2026:1473
Important: openssl security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-g78j-46j5-97cr Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3... | CVSS3: 4.7 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68160 Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an... | CVSS3: 4.7 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68160 Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an... | CVSS3: 4.7 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68160 Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an | CVSS3: 4.7 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68160 Issue summary: Writing large, newline-free data into a BIO chain using ... | CVSS3: 4.7 | 0% Низкий | около 2 месяцев назад | |
BDU:2026-01216 Уязвимость функции BIO_f_linebuffer() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.7 | 0% Низкий | 4 месяца назад | |
SUSE-SU-2026:0498-1 Security update for openssl1 | около 1 месяца назад | |||
SUSE-SU-2026:0333-1 Security update for openssl-1_0_0 | около 2 месяцев назад | |||
SUSE-SU-2026:0332-1 Security update for openssl-1_0_0 | около 2 месяцев назад | |||
SUSE-SU-2026:0360-1 Security update for openssl-1_1 | около 2 месяцев назад | |||
SUSE-SU-2026:0359-1 Security update for openssl-1_1 | около 2 месяцев назад | |||
SUSE-SU-2026:0358-1 Security update for openssl-1_1 | около 2 месяцев назад | |||
SUSE-SU-2026:0346-1 Security update for openssl-1_1 | около 2 месяцев назад | |||
SUSE-SU-2026:0331-1 Security update for openssl-1_1 | около 2 месяцев назад | |||
SUSE-SU-2026:0312-1 Security update for openssl-3 | около 2 месяцев назад | |||
SUSE-SU-2026:0311-1 Security update for openssl-3 | около 2 месяцев назад | |||
SUSE-SU-2026:0310-1 Security update for openssl-3 | около 2 месяцев назад | |||
SUSE-SU-2026:0309-1 Security update for openssl-3 | около 2 месяцев назад | |||
openSUSE-SU-2026:20152-1 Security update for openssl-3 | около 2 месяцев назад | |||
RLSA-2026:1473 Important: openssl security update | около 2 месяцев назад |
Уязвимостей на страницу