Логотип exploitDog
bind:CVE-2025-69418
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-69418

Количество 19

Количество 19

ubuntu логотип

CVE-2025-69418

8 дней назад

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP a...

CVSS3: 4
EPSS: Низкий
nvd логотип

CVE-2025-69418

8 дней назад

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and

CVSS3: 4
EPSS: Низкий
debian логотип

CVE-2025-69418

8 дней назад

Issue summary: When using the low-level OCB API directly with AES-NI o ...

CVSS3: 4
EPSS: Низкий
github логотип

GHSA-78qr-24v5-7q73

8 дней назад

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP a...

CVSS3: 4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0360-1

3 дня назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0359-1

3 дня назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0358-1

3 дня назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0346-1

6 дней назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0331-1

7 дней назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0312-1

8 дней назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0311-1

8 дней назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0310-1

8 дней назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0309-1

8 дней назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2026:1472

5 дней назад

Important: openssl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50081

6 дней назад

ELSA-2026-50081: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50080

6 дней назад

ELSA-2026-50080: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50075

7 дней назад

ELSA-2026-50075: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1473

8 дней назад

ELSA-2026-1473: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1472

8 дней назад

ELSA-2026-1472: openssl security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-69418

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP a...

CVSS3: 4
0%
Низкий
8 дней назад
nvd логотип
CVE-2025-69418

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and

CVSS3: 4
0%
Низкий
8 дней назад
debian логотип
CVE-2025-69418

Issue summary: When using the low-level OCB API directly with AES-NI o ...

CVSS3: 4
0%
Низкий
8 дней назад
github логотип
GHSA-78qr-24v5-7q73

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP a...

CVSS3: 4
0%
Низкий
8 дней назад
suse-cvrf логотип
SUSE-SU-2026:0360-1

Security update for openssl-1_1

3 дня назад
suse-cvrf логотип
SUSE-SU-2026:0359-1

Security update for openssl-1_1

3 дня назад
suse-cvrf логотип
SUSE-SU-2026:0358-1

Security update for openssl-1_1

3 дня назад
suse-cvrf логотип
SUSE-SU-2026:0346-1

Security update for openssl-1_1

6 дней назад
suse-cvrf логотип
SUSE-SU-2026:0331-1

Security update for openssl-1_1

7 дней назад
suse-cvrf логотип
SUSE-SU-2026:0312-1

Security update for openssl-3

8 дней назад
suse-cvrf логотип
SUSE-SU-2026:0311-1

Security update for openssl-3

8 дней назад
suse-cvrf логотип
SUSE-SU-2026:0310-1

Security update for openssl-3

8 дней назад
suse-cvrf логотип
SUSE-SU-2026:0309-1

Security update for openssl-3

8 дней назад
rocky логотип
RLSA-2026:1472

Important: openssl security update

5 дней назад
oracle-oval логотип
ELSA-2026-50081

ELSA-2026-50081: openssl security update (IMPORTANT)

6 дней назад
oracle-oval логотип
ELSA-2026-50080

ELSA-2026-50080: openssl security update (IMPORTANT)

6 дней назад
oracle-oval логотип
ELSA-2026-50075

ELSA-2026-50075: openssl security update (IMPORTANT)

7 дней назад
oracle-oval логотип
ELSA-2026-1473

ELSA-2026-1473: openssl security update (IMPORTANT)

8 дней назад
oracle-oval логотип
ELSA-2026-1472

ELSA-2026-1472: openssl security update (IMPORTANT)

8 дней назад

Уязвимостей на страницу