PT-2026-4942 · Openssl+4 · Openssl+4

Stanislav Fort

·

Published

2025-01-01

·

Updated

2026-03-15

·

CVE-2025-15468

CVSS v3.1

5.9

Medium

AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions OpenSSL versions 3.3 through 3.6
Description A flaw exists in OpenSSL where the SSL CIPHER find() function, when used in a QUIC protocol client or server, can experience a NULL pointer dereference if it receives an unknown cipher suite from its peer. This can lead to a denial of service, causing the process to terminate unexpectedly. The issue was introduced with the addition of QUIC protocol support in version 3.2. The FIPS modules in versions 3.6, 3.5, 3.4, and 3.3 are not affected as the QUIC implementation is outside the OpenSSL FIPS module boundary. The vulnerable function is SSL CIPHER find().
Recommendations OpenSSL versions 3.3 through 3.6 should be updated to a fixed version. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

DoS

NULL Pointer Dereference

Weakness Enumeration

Related Identifiers

ALSA-2026:1472
ALSA-2026:1473
BDU:2026-01215
CVE-2025-15468
OPENSUSE-SU-2026:10237-1
OPENSUSE-SU-2026:20152-1
RHSA-2026:1472
RHSA-2026:1473
SUSE-SU-2026:20211-1
SUSE-SU-2026:20223-1
SUSE-SU-2026:20542-1
SUSE-SU-2026:20607-1
USN-7980-1

Affected Products

Freebsd
Linuxmint
Openssl
Rocky Linux
Ubuntu