Количество 21
Количество 21
GHSA-g78j-46j5-97cr
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3...
CVE-2025-68160
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an...
CVE-2025-68160
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an
CVE-2025-68160
Issue summary: Writing large, newline-free data into a BIO chain using ...
SUSE-SU-2026:0333-1
Security update for openssl-1_0_0
SUSE-SU-2026:0332-1
Security update for openssl-1_0_0
SUSE-SU-2026:0360-1
Security update for openssl-1_1
SUSE-SU-2026:0359-1
Security update for openssl-1_1
SUSE-SU-2026:0358-1
Security update for openssl-1_1
SUSE-SU-2026:0346-1
Security update for openssl-1_1
SUSE-SU-2026:0331-1
Security update for openssl-1_1
SUSE-SU-2026:0312-1
Security update for openssl-3
SUSE-SU-2026:0311-1
Security update for openssl-3
SUSE-SU-2026:0310-1
Security update for openssl-3
SUSE-SU-2026:0309-1
Security update for openssl-3
RLSA-2026:1472
Important: openssl security update
ELSA-2026-50081
ELSA-2026-50081: openssl security update (IMPORTANT)
ELSA-2026-50080
ELSA-2026-50080: openssl security update (IMPORTANT)
ELSA-2026-50075
ELSA-2026-50075: openssl security update (IMPORTANT)
ELSA-2026-1473
ELSA-2026-1473: openssl security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-g78j-46j5-97cr Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3... | CVSS3: 4.7 | 0% Низкий | 8 дней назад | |
CVE-2025-68160 Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an... | CVSS3: 4.7 | 0% Низкий | 8 дней назад | |
CVE-2025-68160 Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 an | CVSS3: 4.7 | 0% Низкий | 8 дней назад | |
CVE-2025-68160 Issue summary: Writing large, newline-free data into a BIO chain using ... | CVSS3: 4.7 | 0% Низкий | 8 дней назад | |
SUSE-SU-2026:0333-1 Security update for openssl-1_0_0 | 7 дней назад | |||
SUSE-SU-2026:0332-1 Security update for openssl-1_0_0 | 7 дней назад | |||
SUSE-SU-2026:0360-1 Security update for openssl-1_1 | 3 дня назад | |||
SUSE-SU-2026:0359-1 Security update for openssl-1_1 | 3 дня назад | |||
SUSE-SU-2026:0358-1 Security update for openssl-1_1 | 3 дня назад | |||
SUSE-SU-2026:0346-1 Security update for openssl-1_1 | 6 дней назад | |||
SUSE-SU-2026:0331-1 Security update for openssl-1_1 | 7 дней назад | |||
SUSE-SU-2026:0312-1 Security update for openssl-3 | 8 дней назад | |||
SUSE-SU-2026:0311-1 Security update for openssl-3 | 8 дней назад | |||
SUSE-SU-2026:0310-1 Security update for openssl-3 | 8 дней назад | |||
SUSE-SU-2026:0309-1 Security update for openssl-3 | 8 дней назад | |||
RLSA-2026:1472 Important: openssl security update | 5 дней назад | |||
ELSA-2026-50081 ELSA-2026-50081: openssl security update (IMPORTANT) | 6 дней назад | |||
ELSA-2026-50080 ELSA-2026-50080: openssl security update (IMPORTANT) | 6 дней назад | |||
ELSA-2026-50075 ELSA-2026-50075: openssl security update (IMPORTANT) | 7 дней назад | |||
ELSA-2026-1473 ELSA-2026-1473: openssl security update (IMPORTANT) | 8 дней назад |
Уязвимостей на страницу