Bug 2430377 (CVE-2025-15468) - CVE-2025-15468 openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling
Summary: CVE-2025-15468 openssl: OpenSSL: Denial of Service via NULL pointer dereferen...
Keywords:
Status: NEW
Alias: CVE-2025-15468
Deadline: 2026-01-27
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-16 14:28 UTC by OSIDB Bzimport
Modified: 2026-02-23 22:59 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2026:1601 0 None None None 2026-01-29 20:10:59 UTC
Red Hat Product Errata RHBA-2026:1605 0 None None None 2026-01-29 22:38:48 UTC
Red Hat Product Errata RHBA-2026:1875 0 None None None 2026-02-04 04:58:31 UTC
Red Hat Product Errata RHSA-2026:1472 0 None None None 2026-01-28 08:57:21 UTC
Red Hat Product Errata RHSA-2026:1473 0 None None None 2026-01-28 09:54:05 UTC

Description OSIDB Bzimport 2026-01-16 14:28:38 UTC
A NULL pointer dereference leads to abnormal termination of
the running process causing Denial of Service.

Some applications call SSL_CIPHER_find() from the client_hello_cb callback
on the cipher ID received from the peer. If this is done with an SSL object
implementing the QUIC protocol, NULL pointer dereference will happen if
the examined cipher ID is unknown or unsupported.

As it is not very common to call this function in applications using the QUIC
protocol and the worst outcome is Denial of Service, the issue was assessed
as Low severity.

The vulnerable code was introduced in the 3.2 version with the addition
of the QUIC protocol support.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,
as the QUIC implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.

OpenSSL 3.6 users should upgrade to OpenSSL 3.6.1.

OpenSSL 3.5 users should upgrade to OpenSSL 3.5.5.

OpenSSL 3.4 users should upgrade to OpenSSL 3.4.4.

OpenSSL 3.3 users should upgrade to OpenSSL 3.3.6.

Comment 2 Jean-frederic Clere 2026-01-19 09:49:52 UTC
JBCS/JWS are not yet supporting QUIC / HTTP3 so they are not affected.

Comment 3 errata-xmlrpc 2026-01-28 08:57:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:1472 https://access.redhat.com/errata/RHSA-2026:1472

Comment 4 errata-xmlrpc 2026-01-28 09:54:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1473 https://access.redhat.com/errata/RHSA-2026:1473


Note You need to log in before you can comment on or make changes to this bug.