{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: The trailing 1-15 bytes of a message may be exposed\n     in<br>cleartext on encryption and are not covered by the authentication\n     tag,<br>allowing an attacker to read or tamper with those bytes without\n     detection\n     - debian/patches/CVE-2025-69418.patch: fix OCB AES-NI/HW stream path\n       unauthenticated/unencrypted trailing bytes\n     - CVE-2025-69418\n   * SECURITY UPDATE: Invalid or NULL pointer dereference when processing\n     malformed PKCS#7 data can result in a Denial of Service\n     - debian/patches/CVE-2026-22796.patch: ensure ASN1 types are checked\n       before use.\n     - CVE-2026-22796\n   * SECURITY UPDATE: Processing a malformed PKCS#12 file can trigger a NULL\n     pointer dereference\n     - debian/patches/CVE-2025-69421.patch: Check oct argument for NULL\n     - CVE-2025-69421",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu18.04els/advisories/2026/clsa-2026_1770804474.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474"
      }
    ],
    "tracking": {
      "current_release_date": "2026-02-11T10:09:18Z",
      "generator": {
        "date": "2026-02-11T10:09:18Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1770804474",
      "initial_release_date": "2026-02-11T10:09:18Z",
      "revision_history": [
        {
          "date": "2026-02-11T10:09:18Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2025-69418, CVE-2025-69421, CVE-2026-22796"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 18.04",
                "product": {
                  "name": "Ubuntu 18.04",
                  "product_id": "Ubuntu-18",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                "product": {
                  "name": "libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                  "product_id": "libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/libssl1.1@1.1.1-1ubuntu2.1~18.04.23%2Btuxcare.els7?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                "product": {
                  "name": "openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                  "product_id": "openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/openssl@1.1.1-1ubuntu2.1~18.04.23%2Btuxcare.els7?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                "product": {
                  "name": "libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                  "product_id": "libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/libssl-dev@1.1.1-1ubuntu2.1~18.04.23%2Btuxcare.els7?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
                "product": {
                  "name": "libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
                  "product_id": "libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/libssl-doc@1.1.1-1ubuntu2.1~18.04.23%2Btuxcare.els7?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
        },
        "product_reference": "libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
        },
        "product_reference": "openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all"
        },
        "product_reference": "libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
        },
        "product_reference": "libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-69421",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer\ndereference in the PKCS12_item_decrypt_d2i_ex() function.\n\nImpact summary: A NULL pointer dereference can trigger a crash which leads to\nDenial of Service for an application processing PKCS#12 files.\n\nThe PKCS12_item_decrypt_d2i_ex() function does not check whether the oct\nparameter is NULL before dereferencing it. When called from\nPKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can\nbe NULL, causing a crash. The vulnerability is limited to Denial of Service\nand cannot be escalated to achieve code execution or memory disclosure.\n\nExploiting this issue requires an attacker to provide a malformed PKCS#12 file\nto an application that processes it. For that reason the issue was assessed as\nLow severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
          "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
          "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
          "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-69421"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b",
          "url": "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7",
          "url": "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd",
          "url": "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3",
          "url": "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3"
        },
        {
          "category": "external",
          "summary": "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c",
          "url": "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c"
        },
        {
          "category": "external",
          "summary": "https://openssl-library.org/news/secadv/20260127.txt",
          "url": "https://openssl-library.org/news/secadv/20260127.txt"
        }
      ],
      "release_date": "2026-01-27T16:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-11T10:07:56.907542Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474",
          "product_ids": [
            "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
            "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
            "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-22796",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
          "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
          "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
          "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-22796"
        }
      ],
      "release_date": "2026-01-27T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-11T10:07:56.907542Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474",
          "product_ids": [
            "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
            "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
            "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-69419",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\nOpenSSL 1.0.2 is not affected by this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
          "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
          "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
          "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-69419"
        }
      ],
      "release_date": "2026-01-27T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-11T10:07:56.907542Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474",
          "product_ids": [
            "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
            "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
            "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-69418",
      "cwe": {
        "id": "CWE-325",
        "name": "Missing Cryptographic Step"
      },
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and provider OCB implementations split inputs so that full<br>blocks and trailing partial blocks are processed in separate calls, avoiding<br>the problematic code path. Additionally, TLS does not use OCB ciphersuites.<br>The vulnerability only affects applications that call the low-level<br>CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with<br>non-block-aligned lengths in a single call on hardware-accelerated builds.<br>For these reasons the issue was assessed as Low severity.<br><br>The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected<br>by this issue, as OCB mode is not a FIPS-approved algorithm.<br><br>OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br><br>OpenSSL 1.0.2 is not affected by this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
          "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
          "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
          "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-69418"
        }
      ],
      "release_date": "2026-01-27T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-11T10:07:56.907542Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474",
          "product_ids": [
            "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
            "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770804474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:libssl-dev-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:libssl-doc-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.all",
            "Ubuntu-18:libssl1.1-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64",
            "Ubuntu-18:openssl-0:1.1.1-1ubuntu2.1~18.04.23+tuxcare.els7.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}