rpm package
almalinux/openssl-devel
pkg:rpm/almalinux/openssl-devel
Vulnerabilities (49)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-22796 | Med | 5.3 | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact su | |
| CVE-2026-22795 | Med | 5.5 | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denia | |
| CVE-2025-69421 | Hig | 7.5 | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. T | |
| CVE-2025-69420 | Hig | 7.5 | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Imp | |
| CVE-2025-69419 | Hig | 7.4 | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cau | |
| CVE-2025-69418 | Med | 4.0 | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: When using the low-level OCB API directly with AES-NI orother hardware-accelerated code paths, inputs whose length is not a multipleof 16 bytes can leave the final partial block unencrypted and unauthenticated.Impact summary: The trailing 1-15 bytes | |
| CVE-2025-68160 | Med | 4.7 | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in | |
| CVE-2025-15467 | Hig | 8.8 | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When | |
| CVE-2025-66199 | — | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approx | ||
| CVE-2025-15469 | — | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, | ||
| CVE-2025-15468 | — | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process ca | ||
| CVE-2025-11187 | — | < 1:3.5.1-7.el10_1.alma.1 | 1:3.5.1-7.el10_1.alma.1 | Jan 27, 2026 | Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash | ||
| CVE-2025-9230 | Hig | 7.5 | < 1:3.5.1-4.el10_1.alma.1 | 1:3.5.1-4.el10_1.alma.1 | Sep 30, 2025 | Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds | |
| CVE-2024-12797 | Med | 6.3 | < 1:3.2.2-6.el9_5.1 | 1:3.2.2-6.el9_5.1 | Feb 11, 2025 | Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set. Impact summary: TLS and DTLS connections u | |
| CVE-2024-4741 | Hig | 7.5 | < 1:3.2.2-6.el9_5 | 1:3.2.2-6.el9_5 | Nov 13, 2024 | Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of | |
| CVE-2024-6119 | Hig | 7.5 | < 1:3.0.7-28.el9_4 | 1:3.0.7-28.el9_4 | Sep 3, 2024 | Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can | |
| CVE-2024-5535 | Cri | 9.1 | < 1:1.1.1k-14.el8_6 | 1:1.1.1k-14.el8_6 | Jun 27, 2024 | Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected appl | |
| CVE-2024-4603 | Med | 5.3 | < 1:3.2.2-6.el9_5 | 1:3.2.2-6.el9_5 | May 16, 2024 | Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parame | |
| CVE-2023-6237 | Med | 5.9 | < 1:3.0.7-27.el9 | 1:3.0.7-27.el9 | Apr 25, 2024 | Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an un | |
| CVE-2024-2511 | Med | 5.9 | < 1:3.2.2-6.el9_5 | 1:3.2.2-6.el9_5 | Apr 8, 2024 | Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This prob |
- affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact su
- affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denia
- affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. T
- affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Imp
- affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cau
- affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: When using the low-level OCB API directly with AES-NI orother hardware-accelerated code paths, inputs whose length is not a multipleof 16 bytes can leave the final partial block unencrypted and unauthenticated.Impact summary: The trailing 1-15 bytes
- affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in
- affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When
- CVE-2025-66199Jan 27, 2026affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approx
- CVE-2025-15469Jan 27, 2026affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519,
- CVE-2025-15468Jan 27, 2026affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process ca
- CVE-2025-11187Jan 27, 2026affected < 1:3.5.1-7.el10_1.alma.1fixed 1:3.5.1-7.el10_1.alma.1
Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash
- affected < 1:3.5.1-4.el10_1.alma.1fixed 1:3.5.1-4.el10_1.alma.1
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds
- affected < 1:3.2.2-6.el9_5.1fixed 1:3.2.2-6.el9_5.1
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set. Impact summary: TLS and DTLS connections u
- affected < 1:3.2.2-6.el9_5fixed 1:3.2.2-6.el9_5
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of
- affected < 1:3.0.7-28.el9_4fixed 1:3.0.7-28.el9_4
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can
- affected < 1:1.1.1k-14.el8_6fixed 1:1.1.1k-14.el8_6
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected appl
- affected < 1:3.2.2-6.el9_5fixed 1:3.2.2-6.el9_5
Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parame
- affected < 1:3.0.7-27.el9fixed 1:3.0.7-27.el9
Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an un
- affected < 1:3.2.2-6.el9_5fixed 1:3.2.2-6.el9_5
Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This prob
Page 1 of 3