Логотип exploitDog
bind:CVE-2025-15469
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-15469

Количество 10

Количество 10

ubuntu логотип

CVE-2025-15469

8 дней назад

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the fu...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-15469

8 дней назад

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the fu

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-15469

8 дней назад

Issue summary: The 'openssl dgst' command-line tool silently truncates ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-v2vr-926q-29fr

8 дней назад

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the...

CVSS3: 5.5
EPSS: Низкий
rocky логотип

RLSA-2026:1472

5 дней назад

Important: openssl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50081

6 дней назад

ELSA-2026-50081: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50080

6 дней назад

ELSA-2026-50080: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50075

7 дней назад

ELSA-2026-50075: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1473

8 дней назад

ELSA-2026-1473: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1472

8 дней назад

ELSA-2026-1472: openssl security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-15469

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the fu...

CVSS3: 5.5
0%
Низкий
8 дней назад
nvd логотип
CVE-2025-15469

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the fu

CVSS3: 5.5
0%
Низкий
8 дней назад
debian логотип
CVE-2025-15469

Issue summary: The 'openssl dgst' command-line tool silently truncates ...

CVSS3: 5.5
0%
Низкий
8 дней назад
github логотип
GHSA-v2vr-926q-29fr

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the...

CVSS3: 5.5
0%
Низкий
8 дней назад
rocky логотип
RLSA-2026:1472

Important: openssl security update

5 дней назад
oracle-oval логотип
ELSA-2026-50081

ELSA-2026-50081: openssl security update (IMPORTANT)

6 дней назад
oracle-oval логотип
ELSA-2026-50080

ELSA-2026-50080: openssl security update (IMPORTANT)

6 дней назад
oracle-oval логотип
ELSA-2026-50075

ELSA-2026-50075: openssl security update (IMPORTANT)

7 дней назад
oracle-oval логотип
ELSA-2026-1473

ELSA-2026-1473: openssl security update (IMPORTANT)

8 дней назад
oracle-oval логотип
ELSA-2026-1472

ELSA-2026-1472: openssl security update (IMPORTANT)

8 дней назад

Уязвимостей на страницу