{"id":"CVE-2025-15468","details":"Issue summary: If an application using the SSL_CIPHER_find() function in\na QUIC protocol client or server receives an unknown cipher suite from\nthe peer, a NULL dereference occurs.\n\nImpact summary: A NULL pointer dereference leads to abnormal termination of\nthe running process causing Denial of Service.\n\nSome applications call SSL_CIPHER_find() from the client_hello_cb callback\non the cipher ID received from the peer. If this is done with an SSL object\nimplementing the QUIC protocol, NULL pointer dereference will happen if\nthe examined cipher ID is unknown or unsupported.\n\nAs it is not very common to call this function in applications using the QUIC \nprotocol and the worst outcome is Denial of Service, the issue was assessed\nas Low severity.\n\nThe vulnerable code was introduced in the 3.2 version with the addition\nof the QUIC protocol support.\n\nThe FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,\nas the QUIC implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.\n\nOpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.","modified":"2026-04-12T17:59:06.013579Z","published":"2026-01-27T16:16:14.400Z","related":["ALSA-2026:1472","ALSA-2026:1473","CGA-gg8h-2f2r-7qx4","SUSE-SU-2026:20211-1","SUSE-SU-2026:20223-1","SUSE-SU-2026:20542-1","SUSE-SU-2026:20607-1","openSUSE-SU-2026:10237-1","openSUSE-SU-2026:20152-1"],"references":[{"type":"ADVISORY","url":"https://openssl-library.org/news/secadv/20260127.txt"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65"},{"type":"FIX","url":"https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"4cb31128b5790819dfeea2739fbde265f71a10a2"},{"fixed":"4601ff25acd6c2fe58a8bfe241e6c470e27b8074"},{"introduced":"98acb6b02839c609ef5b837794e08d906d965335"},{"fixed":"565bdcc41bbf89fcbaf962636469332689f0c9fd"},{"introduced":"636dfadc70ce26f2473870570bfd9ec352806b1d"},{"fixed":"67b5686b4419b4cb8caa502711c41815f5279751"},{"introduced":"7b371d80d959ec9ab4139d09d78e83c090de9779"},{"fixed":"c9a9e5b10105ad850b6e4d1122c645c67767c341"},{"fixed":"1f08e54bad32843044fe8a675948d65e3b4ece65"},{"fixed":"7c88376731c589ee5b36116c5a6e32d5ae5f7ae2"},{"fixed":"b2539639400288a4580fe2d76247541b976bade4"},{"fixed":"d75b309879631d45b972396ce4e5102559c64ac7"}],"database_specific":{"versions":[{"introduced":"3.3.0"},{"fixed":"3.3.6"},{"introduced":"3.4.0"},{"fixed":"3.4.4"},{"introduced":"3.5.0"},{"fixed":"3.5.5"},{"introduced":"3.6.0"},{"fixed":"3.6.1"}]}}],"versions":["3.3-POST-CLANG-FORMAT-WEBKIT","3.3-PRE-CLANG-FORMAT-WEBKIT","3.4-POST-CLANG-FORMAT-WEBKIT","3.4-PRE-CLANG-FORMAT-WEBKIT","3.5-POST-CLANG-FORMAT-WEBKIT","3.5-PRE-CLANG-FORMAT-WEBKIT","3.6-POST-CLANG-FORMAT-WEBKIT","3.6-PRE-CLANG-FORMAT-WEBKIT","openssl-3.3.0","openssl-3.3.1","openssl-3.3.2","openssl-3.3.3","openssl-3.3.4","openssl-3.3.5","openssl-3.4.0","openssl-3.4.1","openssl-3.4.2","openssl-3.4.3","openssl-3.5.0","openssl-3.5.1","openssl-3.5.2","openssl-3.5.3","openssl-3.5.4","openssl-3.6.0"],"database_specific":{"vanir_signatures":[{"target":{"file":"ssl/quic/quic_impl.c"},"id":"CVE-2025-15468-2ba5ff4f","signature_type":"Line","source":"https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["301174472499023802260295463722541748325","238942074834082917347798380654656722229","219113749534777150036648988684825655256"]},"deprecated":false},{"target":{"function":"ossl_quic_get_cipher_by_char","file":"ssl/quic/quic_impl.c"},"id":"CVE-2025-15468-503082ce","signature_type":"Function","source":"https://github.com/openssl/openssl/commit/b2539639400288a4580fe2d76247541b976bade4","signature_version":"v1","digest":{"function_hash":"15486123516276700958646920012673619227","length":172},"deprecated":false},{"target":{"file":"ssl/quic/quic_impl.c"},"id":"CVE-2025-15468-5a74c3f8","signature_type":"Line","source":"https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["301174472499023802260295463722541748325","238942074834082917347798380654656722229","219113749534777150036648988684825655256"]},"deprecated":false},{"target":{"function":"ossl_quic_get_cipher_by_char","file":"ssl/quic/quic_impl.c"},"id":"CVE-2025-15468-6262c36b","signature_type":"Function","source":"https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7","signature_version":"v1","digest":{"function_hash":"15486123516276700958646920012673619227","length":172},"deprecated":false},{"target":{"function":"ossl_quic_get_cipher_by_char","file":"ssl/quic/quic_impl.c"},"id":"CVE-2025-15468-646f3586","signature_type":"Function","source":"https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2","signature_version":"v1","digest":{"function_hash":"15486123516276700958646920012673619227","length":172},"deprecated":false},{"target":{"function":"ossl_quic_get_cipher_by_char","file":"ssl/quic/quic_impl.c"},"id":"CVE-2025-15468-ca210041","signature_type":"Function","source":"https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65","signature_version":"v1","digest":{"function_hash":"15486123516276700958646920012673619227","length":172},"deprecated":false},{"target":{"file":"ssl/quic/quic_impl.c"},"id":"CVE-2025-15468-e36f1b7d","signature_type":"Line","source":"https://github.com/openssl/openssl/commit/d75b309879631d45b972396ce4e5102559c64ac7","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["301174472499023802260295463722541748325","238942074834082917347798380654656722229","219113749534777150036648988684825655256"]},"deprecated":false},{"target":{"file":"ssl/quic/quic_impl.c"},"id":"CVE-2025-15468-ef2255bb","signature_type":"Line","source":"https://github.com/openssl/openssl/commit/7c88376731c589ee5b36116c5a6e32d5ae5f7ae2","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["301174472499023802260295463722541748325","238942074834082917347798380654656722229","219113749534777150036648988684825655256"]},"deprecated":false}],"vanir_signatures_modified":"2026-04-12T17:59:06Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15468.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}