JLSEC-2026-262

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-262.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-262.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2026-262
Upstream
  • EUVD-2025-206396
  • GHSA-78qr-24v5-7q73
Published
2026-04-27T18:33:55.942Z
Modified
2026-04-27T19:02:30.012635293Z
Severity
  • 4.0 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware...
Details

Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and provider OCB implementations split inputs so that full<br>blocks and trailing partial blocks are processed in separate calls, avoiding<br>the problematic code path. Additionally, TLS does not use OCB ciphersuites.<br>The vulnerability only affects applications that call the low-level<br>CRYPTOocb128encrypt() or CRYPTOocb128decrypt() functions directly with<br>non-block-aligned lengths in a single call on hardware-accelerated builds.<br>For these reasons the issue was assessed as Low severity.<br><br>The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected<br>by this issue, as OCB mode is not a FIPS-approved algorithm.<br><br>OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br><br>OpenSSL 1.0.2 is not affected by this issue.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "modified": "2026-02-02T18:36:03.557Z",
            "id": "CVE-2025-69418",
            "imported": "2026-04-27T16:32:50.015Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69418",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-69418",
            "database_specific": {
                "status": "Analyzed"
            },
            "published": "2026-01-27T16:16:33.253Z"
        },
        {
            "modified": "2026-01-29T18:32:44Z",
            "published": "2026-01-27T18:32:15Z",
            "imported": "2026-04-27T16:33:46.484Z",
            "html_url": "https://github.com/advisories/GHSA-78qr-24v5-7q73",
            "url": "https://api.github.com/advisories/GHSA-78qr-24v5-7q73",
            "id": "GHSA-78qr-24v5-7q73"
        },
        {
            "modified": "2026-01-29T15:07:14Z",
            "published": "2026-01-27T16:01:23Z",
            "imported": "2026-04-27T16:33:06.143Z",
            "html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-206396",
            "url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2025-206396",
            "id": "EUVD-2025-206396"
        }
    ]
}
References

Affected packages

Julia / OpenSSL_jll

Package

Name
OpenSSL_jll
Purl
pkg:julia/OpenSSL_jll?uuid=458c3c95-2e84-50aa-8efc-19380b2a3a95

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.20+0
Introduced
3.5.0+0
Fixed
3.5.5+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-262.json"

Julia / Openresty_jll

Package

Name
Openresty_jll
Purl
pkg:julia/Openresty_jll?uuid=87da34d4-7b1b-5a94-8376-8cb65bf3132c

Affected ranges

Type
SEMVER
Events
Introduced
1.19.9+0
Fixed
1.29.203+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-262.json"