|
| 1 | +OpenSSL Security Advisory [30th September 2025] |
| 2 | +=============================================== |
| 3 | + |
| 4 | +Out-of-bounds read & write in RFC 3211 KEK Unwrap (CVE-2025-9230) |
| 5 | +================================================================= |
| 6 | + |
| 7 | +Severity: Moderate |
| 8 | + |
| 9 | +Issue summary: An application trying to decrypt CMS messages encrypted using |
| 10 | +password based encryption can trigger an out-of-bounds read and write. |
| 11 | + |
| 12 | +Impact summary: This out-of-bounds read may trigger a crash which leads to |
| 13 | +Denial of Service for an application. The out-of-bounds write can cause |
| 14 | +a memory corruption which can have various consequences including |
| 15 | +a Denial of Service or Execution of attacker-supplied code. |
| 16 | + |
| 17 | +Although the consequences of a successful exploit of this vulnerability |
| 18 | +could be severe, the probability that the attacker would be able to |
| 19 | +perform it is low. Besides, password based (PWRI) encryption support in CMS |
| 20 | +messages is very rarely used. For that reason the issue was assessed as |
| 21 | +Moderate severity according to our Security Policy. |
| 22 | + |
| 23 | +The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this |
| 24 | +issue, as the CMS implementation is outside the OpenSSL FIPS module |
| 25 | +boundary. |
| 26 | + |
| 27 | +OpenSSL 3.5, 3.4, 3.3, 3.2, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue. |
| 28 | + |
| 29 | +OpenSSL 3.5 users should upgrade to OpenSSL 3.5.4. |
| 30 | + |
| 31 | +OpenSSL 3.4 users should upgrade to OpenSSL 3.4.3. |
| 32 | + |
| 33 | +OpenSSL 3.3 users should upgrade to OpenSSL 3.3.5. |
| 34 | + |
| 35 | +OpenSSL 3.2 users should upgrade to OpenSSL 3.2.6. |
| 36 | + |
| 37 | +OpenSSL 3.0 users should upgrade to OpenSSL 3.0.18. |
| 38 | + |
| 39 | +OpenSSL 1.1.1 users should upgrade to OpenSSL 1.1.1zd. |
| 40 | +(premium support customers only) |
| 41 | + |
| 42 | +OpenSSL 1.0.2 users should upgrade to OpenSSL 1.0.2zm. |
| 43 | +(premium support customers only) |
| 44 | + |
| 45 | +This issue was reported on 9th August 2025 by Stanislav Fort (Aisle Research). |
| 46 | +The fix was developed by Stanislav Fort (Aisle Research) and Viktor Dukhovni. |
| 47 | + |
| 48 | + |
| 49 | +Timing side-channel in SM2 algorithm on 64 bit ARM (CVE-2025-9231) |
| 50 | +================================================================= |
| 51 | + |
| 52 | +Severity: Moderate |
| 53 | + |
| 54 | +Issue summary: A timing side-channel which could potentially allow remote |
| 55 | +recovery of the private key exists in the SM2 algorithm implementation on 64 bit |
| 56 | +ARM platforms. |
| 57 | + |
| 58 | +Impact summary: A timing side-channel in SM2 signature computations on 64 bit |
| 59 | +ARM platforms could allow recovering the private key by an attacker. |
| 60 | + |
| 61 | +While remote key recovery over a network was not attempted by the reporter, |
| 62 | +timing measurements revealed a timing signal which may allow such an attack. |
| 63 | + |
| 64 | +OpenSSL does not directly support certificates with SM2 keys in TLS, and so |
| 65 | +this CVE is not relevant in most TLS contexts. However, given that it is |
| 66 | +possible to add support for such certificates via a custom provider, coupled |
| 67 | +with the fact that in such a custom provider context the private key may be |
| 68 | +recoverable via remote timing measurements, we consider this to be a Moderate |
| 69 | +severity issue. |
| 70 | + |
| 71 | +The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this |
| 72 | +issue, as SM2 is not an approved algorithm. |
| 73 | + |
| 74 | +OpenSSL 3.1, 3.0, 1.1.1 and 1.0.2 are not vulnerable to this issue. |
| 75 | + |
| 76 | +OpenSSL 3.5, 3.4, 3.3, and 3.2 are vulnerable to this issue. |
| 77 | + |
| 78 | +OpenSSL 3.5 users should upgrade to OpenSSL 3.5.4. |
| 79 | + |
| 80 | +OpenSSL 3.4 users should upgrade to OpenSSL 3.4.3. |
| 81 | + |
| 82 | +OpenSSL 3.3 users should upgrade to OpenSSL 3.3.5. |
| 83 | + |
| 84 | +OpenSSL 3.2 users should upgrade to OpenSSL 3.2.6. |
| 85 | + |
| 86 | +This issue was reported on 18th August 2025 by Stanislav Fort (Aisle Research) |
| 87 | +The fix was developed by Stanislav Fort. |
| 88 | + |
| 89 | +Out-of-bounds read in HTTP client no_proxy handling (CVE-2025-9232) |
| 90 | +=================================================================== |
| 91 | + |
| 92 | +Severity: Low |
| 93 | + |
| 94 | +Issue summary: An application using the OpenSSL HTTP client API functions may |
| 95 | +trigger an out-of-bounds read if the "no_proxy" environment variable is set and |
| 96 | +the host portion of the authority component of the HTTP URL is an IPv6 address. |
| 97 | + |
| 98 | +Impact summary: An out-of-bounds read can trigger a crash which leads to |
| 99 | +Denial of Service for an application. |
| 100 | + |
| 101 | +The OpenSSL HTTP client API functions can be used directly by applications |
| 102 | +but they are also used by the OCSP client functions and CMP (Certificate |
| 103 | +Management Protocol) client implementation in OpenSSL. However the URLs used |
| 104 | +by these implementations are unlikely to be controlled by an attacker. |
| 105 | + |
| 106 | +In this vulnerable code the out of bounds read can only trigger a crash. |
| 107 | +Furthermore the vulnerability requires an attacker-controlled URL to be |
| 108 | +passed from an application to the OpenSSL function and the user has to have |
| 109 | +a "no_proxy" environment variable set. For the aforementioned reasons the |
| 110 | +issue was assessed as Low severity. |
| 111 | + |
| 112 | +The vulnerable code was introduced in the following patch releases: |
| 113 | +3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0. |
| 114 | + |
| 115 | +The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this |
| 116 | +issue, as the HTTP client implementation is outside the OpenSSL FIPS module |
| 117 | +boundary. |
| 118 | + |
| 119 | +OpenSSL 3.5, 3.4, 3.3, 3.2 and 3.0 are vulnerable to this issue. |
| 120 | + |
| 121 | +OpenSSL 1.1.1 and 1.0.2 are not affected by this issue. |
| 122 | + |
| 123 | +OpenSSL 3.5 users should upgrade to OpenSSL 3.5.4. |
| 124 | + |
| 125 | +OpenSSL 3.4 users should upgrade to OpenSSL 3.4.3. |
| 126 | + |
| 127 | +OpenSSL 3.3 users should upgrade to OpenSSL 3.3.5. |
| 128 | + |
| 129 | +OpenSSL 3.2 users should upgrade to OpenSSL 3.2.6. |
| 130 | + |
| 131 | +OpenSSL 3.0 users should upgrade to OpenSSL 3.0.18. |
| 132 | + |
| 133 | +This issue was reported on 16th August 2025 by Stanislav Fort (Aisle Research). |
| 134 | +The fix was developed by Stanislav Fort (Aisle Research). |
| 135 | + |
| 136 | +General Advisory Notes |
| 137 | +====================== |
| 138 | + |
| 139 | +URL for this Security Advisory: |
| 140 | +https://openssl-library.org/news/secadv/20250930.txt |
| 141 | + |
| 142 | +Note: the online version of the advisory may be updated with additional details |
| 143 | +over time. |
| 144 | + |
| 145 | +For details of OpenSSL severity classifications please see: |
| 146 | +https://openssl-library.org/policies/general/security-policy/ |
0 commit comments