Amazon Linux 2023 Security Advisory: ALAS2023-2026-1434
Advisory Released Date: 2026-02-18
Advisory Updated Date: 2026-02-18
FAQs regarding Amazon Linux ALAS/CVE Severity
If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. (CVE-2025-15468)
A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. (CVE-2025-66199)
Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. (CVE-2025-68160)
When using the low-level OCB API directly with AES-NI or other hardware-accelerated code paths, inputs whose length is not a multiple of 16 bytes can leave the final partial block unencrypted and unauthenticated. (CVE-2025-69418)
Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. (CVE-2025-69419)
A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. (CVE-2025-69420)
Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. (CVE-2025-69421)
An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. (CVE-2026-22795)
ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function
NOTE: https://openssl-library.org/news/secadv/20260127.txt (CVE-2026-22796)
Affected Packages:
openssl
Issue Correction:
Run dnf update openssl --releasever 2023.10.20260216 or dnf update --advisory ALAS2023-2026-1434 --releasever 2023.10.20260216 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
openssl-libs-debuginfo-3.2.2-1.amzn2023.0.5.aarch64
openssl-fips-provider-latest-debuginfo-3.2.2-1.amzn2023.0.5.aarch64
openssl-fips-provider-latest-3.2.2-1.amzn2023.0.5.aarch64
openssl-snapsafe-libs-debuginfo-3.2.2-1.amzn2023.0.5.aarch64
openssl-libs-3.2.2-1.amzn2023.0.5.aarch64
openssl-3.2.2-1.amzn2023.0.5.aarch64
openssl-debuginfo-3.2.2-1.amzn2023.0.5.aarch64
openssl-snapsafe-libs-3.2.2-1.amzn2023.0.5.aarch64
openssl-perl-3.2.2-1.amzn2023.0.5.aarch64
openssl-debugsource-3.2.2-1.amzn2023.0.5.aarch64
openssl-devel-3.2.2-1.amzn2023.0.5.aarch64
src:
openssl-3.2.2-1.amzn2023.0.5.src
x86_64:
openssl-debuginfo-3.2.2-1.amzn2023.0.5.x86_64
openssl-fips-provider-latest-debuginfo-3.2.2-1.amzn2023.0.5.x86_64
openssl-snapsafe-libs-debuginfo-3.2.2-1.amzn2023.0.5.x86_64
openssl-perl-3.2.2-1.amzn2023.0.5.x86_64
openssl-libs-debuginfo-3.2.2-1.amzn2023.0.5.x86_64
openssl-libs-3.2.2-1.amzn2023.0.5.x86_64
openssl-snapsafe-libs-3.2.2-1.amzn2023.0.5.x86_64
openssl-fips-provider-latest-3.2.2-1.amzn2023.0.5.x86_64
openssl-3.2.2-1.amzn2023.0.5.x86_64
openssl-debugsource-3.2.2-1.amzn2023.0.5.x86_64
openssl-devel-3.2.2-1.amzn2023.0.5.x86_64