JLSEC-2026-257

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-257.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-257.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2026-257
Upstream
  • EUVD-2025-206400
  • GHSA-rhx3-fg8p-f9m4
Published
2026-04-27T18:33:55.942Z
Modified
2026-04-27T19:02:27.522197771Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client...
Details

Issue summary: If an application using the SSLCIPHERfind() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs.

Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service.

Some applications call SSLCIPHERfind() from the clienthellocb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported.

As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity.

The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "modified": "2026-02-02T18:38:00.947Z",
            "published": "2026-01-27T16:16:14.400Z",
            "imported": "2026-04-27T16:32:48.304Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15468",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-15468",
            "database_specific": {
                "status": "Analyzed"
            },
            "id": "CVE-2025-15468"
        },
        {
            "modified": "2026-01-29T15:31:31Z",
            "id": "GHSA-rhx3-fg8p-f9m4",
            "imported": "2026-04-27T16:36:03.577Z",
            "html_url": "https://github.com/advisories/GHSA-rhx3-fg8p-f9m4",
            "url": "https://api.github.com/advisories/GHSA-rhx3-fg8p-f9m4",
            "published": "2026-01-27T18:32:15Z"
        },
        {
            "modified": "2026-01-29T14:53:03Z",
            "id": "EUVD-2025-206400",
            "imported": "2026-04-27T16:33:07.679Z",
            "html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-206400",
            "url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2025-206400",
            "published": "2026-01-27T16:01:20Z"
        }
    ]
}
References

Affected packages

Julia / OpenSSL_jll

Package

Name
OpenSSL_jll
Purl
pkg:julia/OpenSSL_jll?uuid=458c3c95-2e84-50aa-8efc-19380b2a3a95

Affected ranges

Type
SEMVER
Events
Introduced
3.5.0+0
Fixed
3.5.5+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-257.json"