oss-sec mailing list archives
Re: OpenSSL Security Advisory (corrected - added CVE-2026-22795 and CVE-2026-22796)
From: Tomas Mraz <tomas () openssl org>
Date: Wed, 28 Jan 2026 10:21:41 +0100
On Wed, 2026-01-28 at 04:06 -0500, Demi Marie Obenour wrote:
On 1/27/26 10:48, Tomas Mraz wrote:OpenSSL Security Advisory [27th January 2026] ============================================= Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (CVE-2025-11187) =================================================================== ================== Severity: Moderate
...
Exploiting this issue requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For this reason the issue was assessed as Moderate severity.I would not at all be surprised if using untrusted private keys is not uncommon. It can be easier to upload a key pair and certificate than to download a CSR, sign it, and then upload the certificates. Also, programs may well assume that the PKCS#12 authenticated encryption is sufficient to mitigate risks from an untrusted file.
Yes, but it is still uncommon enough to keep this at Moderate severity in our opinion.
Stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025- 15467) =================================================================== ==== Severity: High
...
If an application calls PKCS7_d2i() and then checks a signature, is it affected?
No. PKCS7 API is not affected, only CMS API.
Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (CVE-2025-69419) =================================================================== =============== Severity: Low
...
The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy.One byte out of bound writes have been exploited before. See https://projectzero.google/2016/12/chrome-os-exploit-one-byte-overflow-and.html
Yes, but this is much more constrained vulnerability than the one you are linking.
Missing ASN1_TYPE validation in TS_RESP_verify_response() function (CVE-2025-69420) =================================================================== ================ Severity: Low Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.Is the data read from the bad pointer returned to the caller?
If you're thinking about leaking some data to the attacker. No, we do not think this can be exploited in such way.
ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (CVE-2026-22796) =================================================================== ===================== Severity: Low Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.Is the memory accessed through the bad pointer returned to the caller in any way?
Again, we do not think this vulnerability can be used to leak any private data to the attacker.
-- Tomáš Mráz, Chief Technology Officer, OpenSSL Foundation Join the Code Protectors or support us on Github Sponsors https://openssl-foundation.org/donate/
Current thread:
- OpenSSL Security Advisory (corrected - added CVE-2026-22795 and CVE-2026-22796) Tomas Mraz (Jan 27)
- Re: OpenSSL Security Advisory (corrected - added CVE-2026-22795 and CVE-2026-22796) Demi Marie Obenour (Jan 28)
- Re: OpenSSL Security Advisory (corrected - added CVE-2026-22795 and CVE-2026-22796) Tomas Mraz (Jan 28)
- Re: OpenSSL Security Advisory (updated text for CVE-2025-15467) Tomas Mraz (Feb 25)
- Re: OpenSSL Security Advisory (corrected - added CVE-2026-22795 and CVE-2026-22796) Demi Marie Obenour (Jan 28)
