Home | History | Annotate | Download | only in 90-test_sslapi_data
History log of /src/crypto/external/apache2/openssl/dist/test/recipes/90-test_sslapi_data/ssltraceref.txt
RevisionDateAuthorComments
 1.1  27-Jan-2026  christos branches: 1.1.1;
Initial revision
 1.1.1.1  27-Jan-2026  christos Import OpenSSL-3.5.5 (previous was 3.5.1)

Changes between 3.5.4 and 3.5.5 [27 Jan 2026]
Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification.

Severity: Moderate

Issue summary: PBMAC1 parameters in PKCS#12 files are missing
validation which can trigger a stack-based buffer overflow, invalid
pointer or NULL pointer dereference during MAC verification.

Impact summary: The stack buffer overflow or NULL pointer dereference
may cause a crash leading to Denial of Service for an application
that parses untrusted PKCS#12 files. The buffer overflow may also
potentially enable code execution depending on platform mitigations.

Reported by: Stanislav Fort (Aisle Research) and Petr #ime#ek (Aisle
Research) and Hamza (Metadust)

(CVE-2025-11187)

Tom�# Mr�z

Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing.

Severity: High

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing
Denial of Service, or potentially remote code execution.

Reported by: Stanislav Fort (Aisle Research)

(CVE-2025-15467)

Igor Ustinov

Fixed NULL dereference in SSL_CIPHER_find() function on unknown cipher ID.

Severity: Low

Issue summary: If an application using the SSL_CIPHER_find() function
in a QUIC protocol client or server receives an unknown cipher
suite from the peer, a NULL dereference occurs.

Impact summary: A NULL pointer dereference leads to abnormal
termination of the running process causing Denial of Service.

Reported by: Stanislav Fort (Aisle Research)

(CVE-2025-15468)

Stanislav Fort

Fixed openssl dgst one-shot codepath silently truncates inputs >16 MiB.

Severity: Low

Issue summary: The openssl dgst command-line tool silently truncates
input data to 16 MiB when using one-shot signing algorithms and
reports success instead of an error.

Impact summary: A user signing or verifying files larger than 16
MiB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA)
may believe the entire file is authenticated while trailing data
beyond 16 MiB remains unauthenticated.

Reported by: Stanislav Fort (Aisle Research)

(CVE-2025-15469)

Viktor Dukhovni

Fixed TLS 1.3 CompressedCertificate excessive memory allocation.

Severity: Low

Issue summary: A TLS 1.3 connection using certificate compression
can be forced to allocate a large buffer before decompression
without checking against the configured certificate size limit.

Impact summary: An attacker can cause per-connection memory
allocations of up to approximately 22 MiB and extra CPU work,
potentially leading to service degradation or resource exhaustion
(Denial of Service).

Reported by: Tomas Dulka (Aisle Research) and Stanislav Fort (Aisle Research)

(CVE-2025-66199)

Tomas Dulka and Stanislav Fort

Fixed Heap out-of-bounds write in BIO_f_linebuffer on short writes.

Severity: Low

Issue summary: Writing large, newline-free data into a BIO chain
using the line-buffering filter where the next BIO performs short
writes can trigger a heap-based out-of-bounds write.

Impact summary: This out-of-bounds write can cause memory corruption
which typically results in a crash, leading to Denial of Service
for an application.

Reported by: Petr Simecek (Aisle Research) and Stanislav Fort (Aisle Research)

(CVE-2025-68160)

Stanislav Fort and Neil Horman

Fixed Unauthenticated/unencrypted trailing bytes with low-level
OCB function calls.

Severity: Low

Issue summary: When using the low-level OCB API directly with AES-NI
or other hardware-accelerated code paths, inputs whose length is
not a multiple of 16 bytes can leave the final partial block
unencrypted and unauthenticated.

Impact summary: The trailing 1-15 bytes of a message may be exposed
in cleartext on encryption and are not covered by the authentication
tag, allowing an attacker to read or tamper with those bytes without
detection.

Reported by: Stanislav Fort (Aisle Research)

(CVE-2025-69418)

Stanislav Fort

Fixed Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion.

Severity: Low

Issue summary: Calling PKCS12_get_friendlyname() function on a
maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly
name containing non-ASCII BMP code point can trigger a one byte
write before the allocated buffer.

Impact summary: The out-of-bounds write can cause a memory corruption
which can have various consequences including a Denial of Service.

Reported by: Stanislav Fort (Aisle Research)

(CVE-2025-69419)

Norbert P�cs

Fixed Missing ASN1_TYPE validation in TS_RESP_verify_response() function.

Severity: Low

Issue summary: A type confusion vulnerability exists in the TimeStamp
Response verification code where an ASN1_TYPE union member is
accessed without first validating the type, causing an invalid or
NULL pointer dereference when processing a malformed TimeStamp
Response file.

Impact summary: An application calling TS_RESP_verify_response()
with a malformed TimeStamp Response can be caused to dereference
an invalid or NULL pointer when reading, resulting in a Denial of
Service.

Reported by: Luigino Camastra (Aisle Research)

(CVE-2025-69420)

Bob Beck

Fixed NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex() function.

Severity: Low

Issue summary: Processing a malformed PKCS#12 file can trigger a
NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex()
function.

Impact summary: A NULL pointer dereference can trigger a crash
which leads to Denial of Service for an application processing
PKCS#12 files.

Reported by: Luigino Camastra (Aisle Research)

(CVE-2025-69421)

Luigino Camastra

Fixed Missing ASN1_TYPE validation in PKCS#12 parsing.

Severity: Low

Issue summary: An invalid or NULL pointer dereference can happen
in an application processing a malformed PKCS#12 file.

Impact summary: An application processing a malformed PKCS#12 file
can be caused to dereference an invalid or NULL pointer on memory
read, resulting in a Denial of Service.

Reported by: Luigino Camastra (Aisle Research)

(CVE-2026-22795)

Bob Beck

Fixed ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function.

Severity: Low

Issue summary: A type confusion vulnerability exists in the signature
verification of signed PKCS#7 data where an ASN1_TYPE union member
is accessed without first validating the type, causing an invalid
or NULL pointer dereference when processing malformed PKCS#7 data.

Impact summary: An application performing signature verification
of PKCS#7 data or calling directly the PKCS7_digest_from_attributes()
function can be caused to dereference an invalid or NULL pointer
when reading, resulting in a Denial of Service.

Reported by: Luigino Camastra (Aisle Research)

(CVE-2026-22796)

Bob Beck

RISC-V capabilities string format has changed to include the base
architecture and the vector length for the V extension.

Bernd Edlinger

Fixed incorrect acceptance of some malformed ECDSA signatures on s390x.

Holger Dengler

Source code has been reformatted with clang-format.

Bob Beck

Changes between 3.5.3 and 3.5.4 [30 Sep 2025]
Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap

Issue summary: An application trying to decrypt CMS messages
encrypted using password based encryption can trigger an out-of-bounds
read and write.

Impact summary: This out-of-bounds read may trigger a crash which
leads to Denial of Service for an application. The out-of-bounds
write can cause a memory corruption which can have various consequences
including a Denial of Service or Execution of attacker-supplied
code.

The issue was reported by Stanislav Fort (Aisle Research).

(CVE-2025-9230)

Viktor Dukhovni

Fix Timing side-channel in SM2 algorithm on 64 bit ARM

Issue summary: A timing side-channel which could potentially allow
remote recovery of the private key exists in the SM2 algorithm
implementation on 64 bit ARM platforms.

Impact summary: A timing side-channel in SM2 signature computations
on 64 bit ARM platforms could allow recovering the private key by
an attacker.

The issue was reported by Stanislav Fort (Aisle Research).

(CVE-2025-9231)

Stanislav Fort and Tom�# Mr�z

Fix Out-of-bounds read in HTTP client no_proxy handling

Issue summary: An application using the OpenSSL HTTP client API
functions may trigger an out-of-bounds read if the "no_proxy"
environment variable is set and the host portion of the authority
component of the HTTP URL is an IPv6 address.

Impact summary: An out-of-bounds read can trigger a crash which
leads to Denial of Service for an application.

The issue was reported by Stanislav Fort (Aisle Research).

(CVE-2025-9232)

Stanislav Fort

The FIPS provider no longer performs a PCT on key import for ECX
keys (that was introduced in 3.5.2), following the latest update
on that requirement in FIPS 140-3 IG 10.3.A additional comment 1.

Eugene Syromiatnikov

Fixed the length of the ASN.1 sequence for the SM3 digests of
RSA-encrypted signatures.

Xiao Lou Dong Feng

Reverted the synthesised OPENSSL_VERSION_NUMBER change for the
release builds, as it broke some exiting applications that relied
on the previous 3.x semantics, as documented in OpenSSL_version(3).

Richard Levitte

Changes between 3.5.2 and 3.5.3 [16 Sep 2025]
Avoided a potential race condition introduced in 3.5.1, where
OSSL_STORE_CTX kept open during lookup while potentially being used
by multiple threads simultaneously, that could lead to potential
crashes when multiple concurrent TLS connections are served.

Matt Caswell

The FIPS provider no longer performs a PCT on key import for RSA,
DH, and EC keys (that was introduced in 3.5.2), following the latest
update on that requirement in FIPS 140-3 IG 10.3.A additional
comment 1.

Dr Paul Dale

Secure memory allocation calls are no longer used for HMAC keys.

Dr Paul Dale

openssl req no longer generates certificates with an empty extension
list when SKID/AKID are set to none during generation.

David Benjamin

The man page date is now derived from the release date provided in
VERSION.dat and not the current date for the released builds.

Enji Cooper

Hardened the provider implementation of the RSA public key "encrypt"
operation to add a missing check that the caller-indicated output
buffer size is at least as large as the byte count of the RSA
modulus. The issue was reported by Arash Ale Ebrahim from SYSPWN.

This operation is typically invoked via EVP_PKEY_encrypt(3). Callers
that in fact provide a sufficiently large buffer, but fail to
correctly indicate its size may now encounter unexpected errors.
In applications that attempt RSA public encryption into a buffer
that is too small, an out-of-bounds write is now avoided and an
error is reported instead.

Viktor Dukhovni

Added FIPS 140-3 PCT on DH key generation.

Nikola Pajkovsky

Fixed the synthesised OPENSSL_VERSION_NUMBER.

Richard Levitte

Changes between 3.5.1 and 3.5.2 [5 Aug 2025]
The FIPS provider now performs a PCT on key import for RSA, EC and
ECX. This is mandated by FIPS 140-3 IG 10.3.A additional comment
1.

Dr Paul Dale

RSS XML Feed