PT-2026-4946 · Openssl+6 · Openssl 3.4+13

Neil Horman

+2

·

Published

2025-01-01

·

Updated

2026-04-20

·

CVE-2025-68160

CVSS v3.1

4.7

Medium

VectorAV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions OpenSSL versions 1.0.2 through 3.6 OpenSSL versions 1.1.1 OpenSSL versions 3.0 through 3.6 OpenSSL versions 3.3 through 3.6 OpenSSL versions 3.4 through 3.6 OpenSSL versions 3.5 through 3.6
Description A heap-based out-of-bounds write can occur when writing large, newline-free data into a BIO chain utilizing the line-buffering filter, particularly when the subsequent BIO performs short writes. This memory corruption can lead to a denial of service. The line-buffering BIO filter (BIO f linebuffer) is not typically used in default TLS/SSL configurations. The issue is assessed as low severity due to the unlikely circumstances of attacker control and the filter's limited use with attacker-controlled data. The FIPS modules in versions 3.0, 3.3, 3.4, 3.5, and 3.6 are not affected as the BIO implementation is outside the FIPS module boundary.
Recommendations OpenSSL version 1.0.2: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL version 1.1.1: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL versions 3.0 through 3.6: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL versions 3.3 through 3.6: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL versions 3.4 through 3.6: At the moment, there is no information about a newer version that contains a fix for this vulnerability. OpenSSL versions 3.5 through 3.6: At the moment, there is no information about a newer version that contains a fix for this vulnerability.

DoS

Memory Corruption

Weakness Enumeration

Related Identifiers

ALSA-2026:1472
ALSA-2026:1473
AZL-75281
AZL-75780
AZL-75887
AZL-76125
AZL-76164
BDU:2026-01216
CVE-2025-68160
ECHO-3DF5-A3A2-6763
MGASA-2026-0029
OESA-2026-1464
OESA-2026-1465
OESA-2026-1466
OESA-2026-1467
OESA-2026-1748
OESA-2026-1749
OESA-2026-1750
OESA-2026-1751
OESA-2026-1752
OESA-2026-1753
OPENSUSE-SU-2026:10237-1
OPENSUSE-SU-2026:20152-1
RHSA-2026:1472
RHSA-2026:1473
RHSA-2026:7261
SUSE-SU-2026:0309-1
SUSE-SU-2026:0310-1
SUSE-SU-2026:0311-1
SUSE-SU-2026:0312-1
SUSE-SU-2026:0331-1
SUSE-SU-2026:0332-1
SUSE-SU-2026:0333-1
SUSE-SU-2026:0343-1
SUSE-SU-2026:0346-1
SUSE-SU-2026:0358-1
SUSE-SU-2026:0359-1
SUSE-SU-2026:0360-1
SUSE-SU-2026:0498-1
SUSE-SU-2026:20211-1
SUSE-SU-2026:20223-1
SUSE-SU-2026:20349-1
SUSE-SU-2026:20373-1
USN-7980-1
USN-7980-2

Affected Products

Freebsd
Ibm Aix
Linuxmint
Openssl 1.0.2
Openssl 1.1.1
Openssl 3.0
Openssl 3.3
Openssl 3.4
Openssl 3.5
Openssl 3.6
Openssl
Red Os
Rocky Linux
Ubuntu