vulnerability

FreeBSD: VID-4b824428-fb93-11f0-b194-8447094a420f (CVE-2026-22795): OpenSSL -- Multiple vulnerabilities

Severity
5
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:C)
Published
Jan 27, 2026
Added
Jan 30, 2026
Modified
Jan 30, 2026

Description

The OpenSSL project reports: Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (CVE-2025-11187) Stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467) NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (CVE-2025-15468) "openssl dgst" one-shot codepath silently truncates inputs >16MB (CVE-2025-15469) TLS 1.3 CompressedCertificate excessive memory allocation (CVE-2025-66199) Heap out-of-bounds write in BIO_f_linebuffer on short writes (CVE-2025-68160) Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (CVE-2025-69418) Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (CVE-2025-69419) Missing ASN1_TYPE validation in TS_RESP_verify_response() function (CVE-2025-69420) NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (CVE-2025-69421) Missing ASN1_TYPE validation in PKCS#12 parsing (CVE-2026-22795) ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (CVE-2026-22796)

Solutions

freebsd-upgrade-base-15_0-release-p2freebsd-upgrade-base-14_3-release-p8freebsd-upgrade-base-13_5-release-p9freebsd-upgrade-package-opensslfreebsd-upgrade-package-openssl33freebsd-upgrade-package-openssl34freebsd-upgrade-package-openssl35freebsd-upgrade-package-openssl36
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.