Bug 2430380 (CVE-2025-68160) - CVE-2025-68160 openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
Summary: CVE-2025-68160 openssl: OpenSSL: Denial of Service due to out-of-bounds write...
Keywords:
Status: NEW
Alias: CVE-2025-68160
Deadline: 2026-01-27
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-16 14:33 UTC by OSIDB Bzimport
Modified: 2026-02-04 04:58 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2026:1601 0 None None None 2026-01-29 20:11:02 UTC
Red Hat Product Errata RHBA-2026:1605 0 None None None 2026-01-29 22:38:45 UTC
Red Hat Product Errata RHBA-2026:1875 0 None None None 2026-02-04 04:58:37 UTC
Red Hat Product Errata RHSA-2026:1472 0 None None None 2026-01-28 08:57:16 UTC
Red Hat Product Errata RHSA-2026:1473 0 None None None 2026-01-28 09:54:09 UTC

Description OSIDB Bzimport 2026-01-16 14:33:27 UTC
This out-of-bounds write can cause memory corruption which
typically results in a crash, leading to Denial of Service for an application.

The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in
TLS/SSL data paths. In OpenSSL command-line applications, it is typically
only pushed onto stdout/stderr on VMS systems. Third-party applications that
explicitly use this filter with a BIO chain that can short-write and that
write large, newline-free data influenced by an attacker would be affected.
However, the circumstances where this could happen are unlikely to be under
attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated
data controlled by an attacker. For that reason the issue was assessed as
Low severity.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the BIO implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.

OpenSSL 3.6 users should upgrade to OpenSSL 3.6.1.

OpenSSL 3.5 users should upgrade to OpenSSL 3.5.5.

OpenSSL 3.4 users should upgrade to OpenSSL 3.4.4.

OpenSSL 3.3 users should upgrade to OpenSSL 3.3.6.

OpenSSL 3.0 users should upgrade to OpenSSL 3.0.19.

OpenSSL 1.1.1 users should upgrade to OpenSSL 1.1.1ze
(premium support customers only).

OpenSSL 1.0.2 users should upgrade to OpenSSL 1.0.2zn
(premium support customers only).

Comment 2 Jean-frederic Clere 2026-01-19 09:42:36 UTC
"The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths" So JBCS/JWS are not affected.

Comment 3 errata-xmlrpc 2026-01-28 08:57:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:1472 https://access.redhat.com/errata/RHSA-2026:1472

Comment 4 errata-xmlrpc 2026-01-28 09:54:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1473 https://access.redhat.com/errata/RHSA-2026:1473


Note You need to log in before you can comment on or make changes to this bug.