ALAS2023-2026-1434


Amazon Linux 2023 Security Advisory: ALAS2023-2026-1434
Advisory Released Date: 2026-02-18
Advisory Updated Date: 2026-02-18
Severity: Important

Issue Overview:

If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. (CVE-2025-15468)

A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. (CVE-2025-66199)

Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. (CVE-2025-68160)

When using the low-level OCB API directly with AES-NI or other hardware-accelerated code paths, inputs whose length is not a multiple of 16 bytes can leave the final partial block unencrypted and unauthenticated. (CVE-2025-69418)

Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. (CVE-2025-69419)

A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. (CVE-2025-69420)

Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. (CVE-2025-69421)

An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. (CVE-2026-22795)

ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function

NOTE: https://openssl-library.org/news/secadv/20260127.txt (CVE-2026-22796)


Affected Packages:

openssl


Issue Correction:
Run dnf update openssl --releasever 2023.10.20260216 or dnf update --advisory ALAS2023-2026-1434 --releasever 2023.10.20260216 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation

New Packages:
aarch64:
    openssl-libs-debuginfo-3.2.2-1.amzn2023.0.5.aarch64
    openssl-fips-provider-latest-debuginfo-3.2.2-1.amzn2023.0.5.aarch64
    openssl-fips-provider-latest-3.2.2-1.amzn2023.0.5.aarch64
    openssl-snapsafe-libs-debuginfo-3.2.2-1.amzn2023.0.5.aarch64
    openssl-libs-3.2.2-1.amzn2023.0.5.aarch64
    openssl-3.2.2-1.amzn2023.0.5.aarch64
    openssl-debuginfo-3.2.2-1.amzn2023.0.5.aarch64
    openssl-snapsafe-libs-3.2.2-1.amzn2023.0.5.aarch64
    openssl-perl-3.2.2-1.amzn2023.0.5.aarch64
    openssl-debugsource-3.2.2-1.amzn2023.0.5.aarch64
    openssl-devel-3.2.2-1.amzn2023.0.5.aarch64

src:
    openssl-3.2.2-1.amzn2023.0.5.src

x86_64:
    openssl-debuginfo-3.2.2-1.amzn2023.0.5.x86_64
    openssl-fips-provider-latest-debuginfo-3.2.2-1.amzn2023.0.5.x86_64
    openssl-snapsafe-libs-debuginfo-3.2.2-1.amzn2023.0.5.x86_64
    openssl-perl-3.2.2-1.amzn2023.0.5.x86_64
    openssl-libs-debuginfo-3.2.2-1.amzn2023.0.5.x86_64
    openssl-libs-3.2.2-1.amzn2023.0.5.x86_64
    openssl-snapsafe-libs-3.2.2-1.amzn2023.0.5.x86_64
    openssl-fips-provider-latest-3.2.2-1.amzn2023.0.5.x86_64
    openssl-3.2.2-1.amzn2023.0.5.x86_64
    openssl-debugsource-3.2.2-1.amzn2023.0.5.x86_64
    openssl-devel-3.2.2-1.amzn2023.0.5.x86_64