openssl-1.1.1k-14.el8_10
エラータID: AXSA:2026-025:02
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap (CVE-2025-9230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-9230
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
Update packages.
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
N/A
SRPMS
- openssl-1.1.1k-14.el8_10.src.rpm
MD5: 3e005da1cb5a9688bc24eae2a919b545
SHA-256: 368d3c1e0ba443d77d6147f62aeba5c977f162ae0b49d80432463949ee26515f
Size: 7.38 MB
Asianux Server 8 for x86_64
- openssl-1.1.1k-14.el8_10.x86_64.rpm
MD5: 8b939150128b89d8e2f576aa8a714c9b
SHA-256: 080c7c870827efe86b11d63813d6eb7f41c1d89ba4152d70652b6fa1e0c1ce37
Size: 710.06 kB - openssl-devel-1.1.1k-14.el8_10.i686.rpm
MD5: 2237200fa6f3d976e450ec155ca50c74
SHA-256: 1166a21ae39819061b99b8fde59f9882aa746517935a9c11135fc6f3861a3185
Size: 2.33 MB - openssl-devel-1.1.1k-14.el8_10.x86_64.rpm
MD5: 94ac7c23533d9faf2534f28bae03a186
SHA-256: cfcfa4b2d7055221f457e352b2c6ba3bb4b9f6dcc8c565791f50a759f4fcb645
Size: 2.33 MB - openssl-libs-1.1.1k-14.el8_10.i686.rpm
MD5: 5454a75891658a92b4cd2495cbdd48af
SHA-256: c37e77ff73d88b953388003e14b4ecf3563630464cc32d2f8d5f388bcc3abc2c
Size: 1.48 MB - openssl-libs-1.1.1k-14.el8_10.x86_64.rpm
MD5: a38fecf0d58c900d98af8ff58cd15d70
SHA-256: 0f30639a6cd837e80e28bc05c7e350204f7e48d3a1253cf1e9f3f86588c63d72
Size: 1.47 MB - openssl-perl-1.1.1k-14.el8_10.x86_64.rpm
MD5: 323b3431687bb6087f9f18714dc0e3ff
SHA-256: 797a3db8f0029fb5dc5a5f61e84cab8f39a05c9f40c89f57979502084410c958
Size: 82.77 kB