PT-2026-4955 · Openssl+5 · Openssl+5

Bob Beck

+1

·

Published

2026-01-01

·

Updated

2026-03-15

·

CVE-2026-22796

CVSS v3.1

5.3

Medium

AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Name of the Vulnerable Software and Affected Versions OpenSSL versions 1.0.2 through 3.6
Description A type confusion issue exists in the signature verification of signed PKCS#7 data. This occurs when an ASN1 TYPE union member is accessed without first validating the type, potentially leading to an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Exploiting this requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of exploitation is a denial-of-service. The vulnerable code is within the PKCS7 digest from attributes() function, which accesses the message digest attribute value without validating its type. This can result in accessing invalid memory through the ASN1 TYPE union, causing a crash. The PKCS7 API is considered legacy, and applications should use the CMS API instead.
Recommendations OpenSSL version 1.0.2: Update to a newer version. OpenSSL versions 1.1.1 through 3.6: Update to the latest version.

Fix

DoS

Improper Check for Exceptional Conditions

Weakness Enumeration

Related Identifiers

ALSA-2026:1472
ALSA-2026:1473
BDU:2026-01220
CVE-2026-22796
ECHO-F3F1-7685-1435
MGASA-2026-0029
OPENSUSE-SU-2026:20152-1
RHSA-2026:1472
RHSA-2026:1473
SUSE-SU-2026:0309-1
SUSE-SU-2026:0310-1
SUSE-SU-2026:0311-1
SUSE-SU-2026:0312-1
SUSE-SU-2026:0331-1
SUSE-SU-2026:0332-1
SUSE-SU-2026:0333-1
SUSE-SU-2026:0343-1
SUSE-SU-2026:0346-1
SUSE-SU-2026:0358-1
SUSE-SU-2026:0359-1
SUSE-SU-2026:0360-1
SUSE-SU-2026:0498-1
SUSE-SU-2026:20211-1
SUSE-SU-2026:20223-1
SUSE-SU-2026:20349-1
SUSE-SU-2026:20373-1
USN-7980-1
USN-7980-2

Affected Products

Freebsd
Ibm Aix
Linuxmint
Openssl
Rocky Linux
Ubuntu