I just noticed there have been multiple vulnerabilities patched in OpenSSL[1]. My OpenWRT 24.10.5 seems to have libopenssl 3.0.18-r1 installed and apparently would need to be upgraded to 3.0.19 to get the fixes. How would I go about doing that?
Iām currently trying to figure out the actual risks, esp. related to the RCE one CVE-2025-15467. I only expose a Wireguard endpoint from my internet facing router, so would it suffice to just turn that off? Would router be safe then?
openssl v3.5.5 has been merged into main- and 25.12.x snapshots three days ago; 24.10.x however still needs attention (~someone to provide a tested patch/ PR).
root@ER605v2:~# apk info libopenssl3
libopenssl3-3.5.5-r1 description:
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Transport Layer Security (TLS) protocol as well as a full-strength general-purpose cryptography library. This package contains the OpenSSL shared libraries, needed by other programs.
libopenssl3-3.5.5-r1 webpage:
https://www.openssl.org/
libopenssl3-3.5.5-r1 installed size:
4522 KiB
This is not Remote Code Execution, but merely Code Execution issue - PKCS#12 refers to certificate material stored in a specific archive file format only. So you would have to use OpenSSL tooling to interpret a (crafted or affected) PKCS#12-encoded file to be vulnerable; socket clients or servers using OpenSSL should be fine.
I am not saying anything to that effect, regardless of the practical severity.
I was merely stating the current state of the active branches (which in turn will feed into the next releases):
main, fixed
25.12.x, fixed
24.10.x, PR submitted today, pending
At no point did I insinuate that bugs don't need to be fixed, nor evaluate effective security impact on the package config used by OpenWrt. And -as of yesterday- no one had submitted a fix, yet - as of today, there is a pending PR. That is merely a fact, an explanation of the status quo (ante), nothing else.