JLSEC-2026-263

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-263.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-263.json
JSON Data
https://api.test.osv.dev/v1/vulns/JLSEC-2026-263
Upstream
  • EUVD-2025-206395
  • GHSA-x77r-97gw-wh89
Published
2026-04-27T18:33:55.942Z
Modified
2026-04-27T19:32:24.316364628Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file...
Details

Issue summary: Calling PKCS12getfriendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer.

Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service.

The OPENSSLuni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmptoutf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer.

The vulnerability is reachable via the public PKCS12getfriendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12parse() uses a different code path that avoids this issue, PKCS12get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "imported": "2026-04-27T16:32:50.551Z",
            "published": "2026-01-27T16:16:34.113Z",
            "database_specific": {
                "status": "Analyzed"
            },
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69419",
            "id": "CVE-2025-69419",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-69419",
            "modified": "2026-02-02T18:35:02.177Z"
        },
        {
            "imported": "2026-04-27T16:34:10.665Z",
            "published": "2026-01-27T18:32:16Z",
            "html_url": "https://github.com/advisories/GHSA-x77r-97gw-wh89",
            "id": "GHSA-x77r-97gw-wh89",
            "url": "https://api.github.com/advisories/GHSA-x77r-97gw-wh89",
            "modified": "2026-01-29T18:32:43Z"
        },
        {
            "imported": "2026-04-27T16:33:05.628Z",
            "published": "2026-01-27T16:01:24Z",
            "html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-206395",
            "id": "EUVD-2025-206395",
            "url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2025-206395",
            "modified": "2026-01-29T15:09:39Z"
        }
    ]
}
References

Affected packages

Julia / OpenSSL_jll

Package

Name
OpenSSL_jll
Purl
pkg:julia/OpenSSL_jll?uuid=458c3c95-2e84-50aa-8efc-19380b2a3a95

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.20+0
Introduced
3.5.0+0
Fixed
3.5.5+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-263.json"

Julia / Openresty_jll

Package

Name
Openresty_jll
Purl
pkg:julia/Openresty_jll?uuid=87da34d4-7b1b-5a94-8376-8cb65bf3132c

Affected ranges

Type
SEMVER
Events
Introduced
1.19.9+0
Fixed
1.29.203+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-263.json"