Segmentation fault in SSL_check_chain
Description
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
OpenSSL TLS 1.3 NULL pointer dereference via crafted signature_algorithms_cert extension leads to denial of service in versions 1.1.1d-1.1.1f.
Vulnerability
CVE-2020-1967 is a NULL pointer dereference in OpenSSL's SSL_check_chain() function during a TLS 1.3 handshake. The flaw arises from incorrect handling of the signature_algorithms_cert extension when an invalid or unrecognized signature algorithm is received from the peer [1]. This affects OpenSSL versions 1.1.1d, 1.1.1e, and 1.1.1f [1].
Exploitation
A malicious peer sends a crafted TLS 1.3 ClientHello or ServerHello containing a malformed signature_algorithms_cert extension. The crash occurs if the server or client calls SSL_check_chain() during or after the handshake. Notably, popular web servers like Apache httpd and Nginx do not invoke this function, limiting the attack surface to custom applications or specific configurations [4]. A proof-of-concept exploit is publicly available [4].
Impact
Successful exploitation allows a remote, unauthenticated attacker to cause a denial of service (DoS) by crashing the peer application [3]. The vulnerability does not lead to data compromise or privilege escalation.
Mitigation
The issue is fixed in OpenSSL 1.1.1g [1]. Users should upgrade immediately. No workaround exists [3]. FreeBSD systems are patched in FreeBSD-SA-20:11.openssl [3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openssl-srccrates.io | >= 111.6.0, < 111.9.0 | 111.9.0 |
Affected products
23- osv-coords22 versionspkg:apk/chainguard/mysql-8.0pkg:apk/chainguard/mysql-8.0-bitnami-compatpkg:apk/chainguard/mysql-8.0-clientpkg:apk/chainguard/mysql-8.0-devpkg:apk/chainguard/mysql-8.0-iamguarded-compatpkg:apk/chainguard/mysql-8.0-oci-entrypointpkg:apk/chainguard/mysql-8.0-oci-entrypoint-compatpkg:cargo/openssl-srcpkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/rust1.53&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/rust-cbindgen&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/rust-cbindgen&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/rust&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/rust&distro=openSUSE%20Leap%2015.2pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/rust&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/rust&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2
< 8.0.38-r0+ 21 more
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: >= 111.6.0, < 111.9.0
- (no CPE)range: < 1.1.1l-1.2
- (no CPE)range: < 1.53.0-2.5
- (no CPE)range: < 0.14.1-lp151.8.2
- (no CPE)range: < 0.14.1-lp152.2.4.1
- (no CPE)range: < 1.43.1-lp151.5.13.1
- (no CPE)range: < 1.43.1-lp152.3.5.1
- (no CPE)range: < 1.1.1d-2.23.1
- (no CPE)range: < 1.1.1d-2.23.1
- (no CPE)range: < 1.1.1d-2.23.1
- (no CPE)range: < 1.1.1d-2.23.1
- (no CPE)range: < 1.1.1d-2.23.1
- (no CPE)range: < 1.1.1d-2.23.1
- (no CPE)range: < 1.43.1-12.1
- (no CPE)range: < 1.43.1-12.1
- Range: Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
43- lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.htmlghsavendor-advisoryx_refsource_SUSEWEB
- lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.htmlghsavendor-advisoryx_refsource_SUSEWEB
- github.com/advisories/GHSA-jq65-29v4-4x35ghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/mitrevendor-advisoryx_refsource_FEDORA
- nvd.nist.gov/vuln/detail/CVE-2020-1967ghsaADVISORY
- security.freebsd.org/advisories/FreeBSD-SA-20:11.openssl.ascghsavendor-advisoryx_refsource_FREEBSDWEB
- security.gentoo.org/glsa/202004-10ghsavendor-advisoryx_refsource_GENTOOWEB
- www.debian.org/security/2020/dsa-4661ghsavendor-advisoryx_refsource_DEBIANWEB
- packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.htmlghsax_refsource_MISCWEB
- seclists.org/fulldisclosure/2020/May/5ghsamailing-listx_refsource_FULLDISCWEB
- www.openwall.com/lists/oss-security/2020/04/22/2ghsamailing-listx_refsource_MLISTWEB
- git.openssl.org/gitweb/mitrex_refsource_CONFIRM
- git.openssl.org/gitweb/ghsaWEB
- kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440ghsax_refsource_CONFIRMWEB
- lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345%40%3Cdev.tomcat.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064%40%3Cdev.tomcat.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee%40%3Cdev.tomcat.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONYghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCDghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SOghsaWEB
- rustsec.org/advisories/RUSTSEC-2020-0015.htmlghsaWEB
- security.netapp.com/advisory/ntap-20200424-0003ghsaWEB
- security.netapp.com/advisory/ntap-20200424-0003/mitrex_refsource_CONFIRM
- security.netapp.com/advisory/ntap-20200717-0004ghsaWEB
- security.netapp.com/advisory/ntap-20200717-0004/mitrex_refsource_CONFIRM
- www.openssl.org/news/secadv/20200421.txtghsax_refsource_CONFIRMWEB
- www.oracle.com//security-alerts/cpujul2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuApr2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujan2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujul2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlghsax_refsource_MISCWEB
- www.synology.com/security/advisory/Synology_SA_20_05ghsax_refsource_CONFIRMWEB
- www.synology.com/security/advisory/Synology_SA_20_05_OpenSSLghsax_refsource_CONFIRMWEB
- www.tenable.com/security/tns-2020-03ghsax_refsource_CONFIRMWEB
- www.tenable.com/security/tns-2020-04ghsax_refsource_CONFIRMWEB
- www.tenable.com/security/tns-2020-11ghsax_refsource_CONFIRMWEB
- www.tenable.com/security/tns-2021-10ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.