* [scarthgap][PATCH] openssl: fix CVE-2025-15468
@ 2026-02-02 4:34 Hitendra Prajapati
2026-02-04 17:07 ` [OE-core] " Yoann Congal
2026-02-19 10:43 ` Yoann Congal
0 siblings, 2 replies; 3+ messages in thread
From: Hitendra Prajapati @ 2026-02-02 4:34 UTC (permalink / raw)
To: openembedded-core; +Cc: Hitendra Prajapati
Upstream-Status: Backport from https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
.../openssl/openssl/CVE-2025-15468.patch | 39 +++++++++++++++++++
.../openssl/openssl_3.2.6.bb | 1 +
2 files changed, 40 insertions(+)
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch
diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch
new file mode 100644
index 0000000000..dcd862bedf
--- /dev/null
+++ b/meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch
@@ -0,0 +1,39 @@
+From 1f08e54bad32843044fe8a675948d65e3b4ece65 Mon Sep 17 00:00:00 2001
+From: Daniel Kubec <kubec@openssl.org>
+Date: Fri, 9 Jan 2026 14:33:24 +0100
+Subject: [PATCH] ossl_quic_get_cipher_by_char(): Add a NULL guard before
+ dereferencing SSL_CIPHER
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+Fixes CVE-2025-15468
+
+Reviewed-by: Saša Nedvědický <sashan@openssl.org>
+Reviewed-by: Tomas Mraz <tomas@openssl.org>
+MergeDate: Mon Jan 26 19:36:04 2026
+(cherry picked from commit 293b55de0c434a99d0e744d0521170ca280606a9)
+
+CVE: CVE-2025-15468
+Upstream-Status: Backport [https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65]
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ ssl/quic/quic_impl.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/ssl/quic/quic_impl.c b/ssl/quic/quic_impl.c
+index 98b6a0a..4abde64 100644
+--- a/ssl/quic/quic_impl.c
++++ b/ssl/quic/quic_impl.c
+@@ -3646,6 +3646,8 @@ const SSL_CIPHER *ossl_quic_get_cipher_by_char(const unsigned char *p)
+ {
+ const SSL_CIPHER *ciph = ssl3_get_cipher_by_char(p);
+
++ if (ciph == NULL)
++ return NULL;
+ if ((ciph->algorithm2 & SSL_QUIC) == 0)
+ return NULL;
+
+--
+2.50.1
+
diff --git a/meta/recipes-connectivity/openssl/openssl_3.2.6.bb b/meta/recipes-connectivity/openssl/openssl_3.2.6.bb
index fac62245d7..4fd13d52fe 100644
--- a/meta/recipes-connectivity/openssl/openssl_3.2.6.bb
+++ b/meta/recipes-connectivity/openssl/openssl_3.2.6.bb
@@ -16,6 +16,7 @@ SRC_URI = "https://github.com/openssl/openssl/releases/download/openssl-${PV}/op
file://CVE-2025-15467-01.patch \
file://CVE-2025-15467-02.patch \
file://CVE-2025-15467-03.patch \
+ file://CVE-2025-15468.patch \
"
SRC_URI:append:class-nativesdk = " \
--
2.50.1
^ permalink raw reply related [flat|nested] 3+ messages in thread* Re: [OE-core] [scarthgap][PATCH] openssl: fix CVE-2025-15468
2026-02-02 4:34 [scarthgap][PATCH] openssl: fix CVE-2025-15468 Hitendra Prajapati
@ 2026-02-04 17:07 ` Yoann Congal
2026-02-19 10:43 ` Yoann Congal
1 sibling, 0 replies; 3+ messages in thread
From: Yoann Congal @ 2026-02-04 17:07 UTC (permalink / raw)
To: hprajapati, openembedded-core
On Mon Feb 2, 2026 at 5:34 AM CET, Hitendra Prajapati via lists.openembedded.org wrote:
> Upstream-Status: Backport from https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65
>
> Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
> ---
> .../openssl/openssl/CVE-2025-15468.patch | 39 +++++++++++++++++++
> .../openssl/openssl_3.2.6.bb | 1 +
> 2 files changed, 40 insertions(+)
> create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch
Hello,
Thanks for the patch.
(Same as CVE-2025-15467)
As far as I can tell, CVE-2025-69419 does also impact whinlatter. Can you
send a fix there (either by then backport or maybe an upgrade?)
Thanks!
--
Yoann Congal
Smile ECS
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [OE-core] [scarthgap][PATCH] openssl: fix CVE-2025-15468
2026-02-02 4:34 [scarthgap][PATCH] openssl: fix CVE-2025-15468 Hitendra Prajapati
2026-02-04 17:07 ` [OE-core] " Yoann Congal
@ 2026-02-19 10:43 ` Yoann Congal
1 sibling, 0 replies; 3+ messages in thread
From: Yoann Congal @ 2026-02-19 10:43 UTC (permalink / raw)
To: hprajapati, openembedded-core
On Mon Feb 2, 2026 at 5:34 AM CET, Hitendra Prajapati via lists.openembedded.org wrote:
> Upstream-Status: Backport from https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65
>
Same remark as https://lists.openembedded.org/g/openembedded-core/topic/117540534#msg231419
Can you send a V2 with an improved commit message please? Content of the
patch looks good.
Thanks!
> Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
> ---
> .../openssl/openssl/CVE-2025-15468.patch | 39 +++++++++++++++++++
> .../openssl/openssl_3.2.6.bb | 1 +
> 2 files changed, 40 insertions(+)
> create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch
>
> diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch
> new file mode 100644
> index 0000000000..dcd862bedf
> --- /dev/null
> +++ b/meta/recipes-connectivity/openssl/openssl/CVE-2025-15468.patch
> @@ -0,0 +1,39 @@
> +From 1f08e54bad32843044fe8a675948d65e3b4ece65 Mon Sep 17 00:00:00 2001
> +From: Daniel Kubec <kubec@openssl.org>
> +Date: Fri, 9 Jan 2026 14:33:24 +0100
> +Subject: [PATCH] ossl_quic_get_cipher_by_char(): Add a NULL guard before
> + dereferencing SSL_CIPHER
> +MIME-Version: 1.0
> +Content-Type: text/plain; charset=UTF-8
> +Content-Transfer-Encoding: 8bit
> +
> +Fixes CVE-2025-15468
> +
> +Reviewed-by: Saša Nedvědický <sashan@openssl.org>
> +Reviewed-by: Tomas Mraz <tomas@openssl.org>
> +MergeDate: Mon Jan 26 19:36:04 2026
> +(cherry picked from commit 293b55de0c434a99d0e744d0521170ca280606a9)
> +
> +CVE: CVE-2025-15468
> +Upstream-Status: Backport [https://github.com/openssl/openssl/commit/1f08e54bad32843044fe8a675948d65e3b4ece65]
> +Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
> +---
> + ssl/quic/quic_impl.c | 2 ++
> + 1 file changed, 2 insertions(+)
> +
> +diff --git a/ssl/quic/quic_impl.c b/ssl/quic/quic_impl.c
> +index 98b6a0a..4abde64 100644
> +--- a/ssl/quic/quic_impl.c
> ++++ b/ssl/quic/quic_impl.c
> +@@ -3646,6 +3646,8 @@ const SSL_CIPHER *ossl_quic_get_cipher_by_char(const unsigned char *p)
> + {
> + const SSL_CIPHER *ciph = ssl3_get_cipher_by_char(p);
> +
> ++ if (ciph == NULL)
> ++ return NULL;
> + if ((ciph->algorithm2 & SSL_QUIC) == 0)
> + return NULL;
> +
> +--
> +2.50.1
> +
> diff --git a/meta/recipes-connectivity/openssl/openssl_3.2.6.bb b/meta/recipes-connectivity/openssl/openssl_3.2.6.bb
> index fac62245d7..4fd13d52fe 100644
> --- a/meta/recipes-connectivity/openssl/openssl_3.2.6.bb
> +++ b/meta/recipes-connectivity/openssl/openssl_3.2.6.bb
> @@ -16,6 +16,7 @@ SRC_URI = "https://github.com/openssl/openssl/releases/download/openssl-${PV}/op
> file://CVE-2025-15467-01.patch \
> file://CVE-2025-15467-02.patch \
> file://CVE-2025-15467-03.patch \
> + file://CVE-2025-15468.patch \
> "
>
> SRC_URI:append:class-nativesdk = " \
--
Yoann Congal
Smile ECS
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2026-02-19 10:43 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-02-02 4:34 [scarthgap][PATCH] openssl: fix CVE-2025-15468 Hitendra Prajapati
2026-02-04 17:07 ` [OE-core] " Yoann Congal
2026-02-19 10:43 ` Yoann Congal
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox