Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-68160
Analyzed
More InfoOfficial Page
Source-openssl-security@openssl.org
View Known Exploited Vulnerability (KEV) details
Published At-27 Jan, 2026 | 16:16
Updated At-02 Feb, 2026 | 18:36

Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

OpenSSL
openssl
>>openssl>>Versions from 1.0.2(inclusive) to 1.0.2zn(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>Versions from 1.1.1(inclusive) to 1.1.1ze(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>Versions from 3.0.0(inclusive) to 3.0.19(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>Versions from 3.3.0(inclusive) to 3.3.6(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>Versions from 3.4.0(inclusive) to 3.4.4(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>Versions from 3.5.0(inclusive) to 3.5.5(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
OpenSSL
openssl
>>openssl>>Versions from 3.6.0(inclusive) to 3.6.1(exclusive)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Secondaryopenssl-security@openssl.org
CWE ID: CWE-787
Type: Secondary
Source: openssl-security@openssl.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162adopenssl-security@openssl.org
Patch
https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6openssl-security@openssl.org
Patch
https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12copenssl-security@openssl.org
Patch
https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0openssl-security@openssl.org
Patch
https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096openssl-security@openssl.org
Patch
https://openssl-library.org/news/secadv/20260127.txtopenssl-security@openssl.org
Vendor Advisory
Hyperlink: https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad
Source: openssl-security@openssl.org
Resource:
Patch
Hyperlink: https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6
Source: openssl-security@openssl.org
Resource:
Patch
Hyperlink: https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c
Source: openssl-security@openssl.org
Resource:
Patch
Hyperlink: https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0
Source: openssl-security@openssl.org
Resource:
Patch
Hyperlink: https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096
Source: openssl-security@openssl.org
Resource:
Patch
Hyperlink: https://openssl-library.org/news/secadv/20260127.txt
Source: openssl-security@openssl.org
Resource:
Vendor Advisory
Change History
0Changes found

Details not found