[Midnightbsd-users] MNBSD-2025-6 OpenSSL security vulnerability (CVE-2025-9230)
Lucas Holt
luke at foolishgames.com
Tue Sep 30 10:44:07 EDT 2025
A security vulnerability is present in OpenSSL in MidnightBSD 3.2.3, 4.0
current.
An application trying to decrypt CMS messages encrypted using password
based encryption can trigger an out-of-bounds read and write. Impact
summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including a
Denial of Service or Execution of attacker-supplied code. Although the
consequences of a successful exploit of this vulnerability could be
severe, the probability that the attacker would be able to perform it is
low. Besides, password based (PWRI) encryption support in CMS messages
is very rarely used. For that reason the issue was assessed as Moderate
severity according to our Security Policy. The FIPS modules in 3.5, 3.4,
3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS
implementation is outside the OpenSSL FIPS module boundary.
Advisory:
https://github.com/MidnightBSD/src/security/advisories/GHSA-7g3w-f2m6-v43c
Patch:
https://github.com/MidnightBSD/src/commit/ad1cfffb414dd9f3e6787cd0e39c3d2b319addd5
(note: we haven't updated the security list on the main website yet)
--
Lucas Holt
Luke at FoolishGames.com
________________________________________________________
MidnightBSD.org (Free OS)
JustJournal.com (Free blogging)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.midnightbsd.org/pipermail/midnightbsd-users/attachments/20250930/42873126/attachment.htm>
More information about the Midnightbsd-users
mailing list