Home / mailings FreeBSD Security Advisory FreeBSD-SA-26:01.openssl
Posted on 27 January 2026
FreeBSD security notificat=============================================================================FreeBSD-SA-26:01.openssl Security Advisory
The FreeBSD Project
Topic: Multiple vulnerabilities in OpenSSL
Category: contrib
Module: openssl
Announced: 2026-01-27
Credits: Aisle Research
Affects: All supported versions of FreeBSD.
Corrected: 2026-01-27 19:14:58 UTC (stable/15, 15.0-STABLE)
2026-01-27 19:15:49 UTC (releng/15.0, 15.0-RELEASE-p2)
2026-01-27 19:15:10 UTC (stable/14, 14.3-STABLE)
2026-01-27 19:16:22 UTC (releng/14.3, 14.3-RELEASE-p8)
2026-01-27 19:15:19 UTC (stable/13, 13.4-STABLE)
2026-01-27 19:16:45 UTC (releng/13.5, 13.5-RELEASE-p9)
CVE Name: CVE-2025-11187, CVE-2025-15467, CVE-2025-15468,
CVE-2025-15469, CVE-2025-66199, CVE-2025-68160,
CVE-2025-69418, CVE-2025-69419, CVE-2025-69420,
CVE-2025-69421, CVE-2026-22795, CVE-2026-22796
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a
collaborative effort to develop a robust, commercial-grade, full-featured
Open Source toolkit for the Transport Layer Security (TLS) protocol. It is
also a general-purpose cryptography library.
II. Problem Description
Multiple issues have been reported as part of this advisory with different
issues affecting different OpenSSL versions and therefore different FreeBSD
versions. Instead of exhaustively listing detailed writeups for each issue,
please see the referenced advisory from OpenSSL.
Issues affecting FreeBSD 15.0 (OpenSSL 3.5):
CVE-2025-11187 - Improper validation of PBMAC1 parameters in PKCS#12 MAC verification
CVE-2025-15467 - Stack buffer overflow in CMS AuthEnvelopedData parsing
CVE-2025-15468 - NULL dereference in SSL_CIPHER_find() function on unknown cipher ID
CVE-2025-15469 - "openssl dgst" one-shot codepath silently truncates inputs >16MB
CVE-2025-66199 - TLS 1.3 CompressedCertificate excessive memory allocation
CVE-2025-68160 - Heap out-of-bounds write in BIO_f_linebuffer on short writes
CVE-2025-69418 - Unauthenticated/unencrypted trailing bytes with low-level OCB function calls
CVE-2025-69419 - Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion
CVE-2025-69420 - Missing ASN1_TYPE validation in TS_RESP_verify_response() function
CVE-2025-69421 - NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function
CVE-2026-22795 - Missing ASN1_TYPE validation in PKCS#12 parsing
CVE-2026-22796 - ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function
Issues affecting FreeBSD 14.3 (OpenSSL 3.0):
CVE-2025-15467 - Stack buffer overflow in CMS AuthEnvelopedData parsing
CVE-2025-68160 - Heap out-of-bounds write in BIO_f_linebuffer on short writes
CVE-2025-69418 - Unauthenticated/unencrypted trailing bytes with low-level OCB function calls
CVE-2025-69419 - Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion
CVE-2025-69420 - Missing ASN1_TYPE validation in TS_RESP_verify_response() function
CVE-2025-69421 - NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function
CVE-2026-22795 - Missing ASN1_TYPE validation in PKCS#12 parsing
CVE-2026-22796 - ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function
Issues affecting FreeBSD 13.5 (OpenSSL 1.1.1):
CVE-2025-68160 - Heap out-of-bounds write in BIO_f_linebuffer on short writes
CVE-2025-69418 - Unauthenticated/unencrypted trailing bytes with low-level OCB function calls
CVE-2025-69419 - Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion
CVE-2025-69420 - Missing ASN1_TYPE validation in TS_RESP_verify_response() function
CVE-2025-69421 - NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function
CVE-2026-22795 - Missing ASN1_TYPE validation in PKCS#12 parsing
CVE-2026-22796 - ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function
III. Impact
The issues include improper/missing validation, NULL pointer dereferences,
out-of-bounds writes, incorrect data exposure, input truncation, excessive
memory allocation, and a stack buffer overflow.
Security impact can be a minimal information disclosure to a potential remote
code execution. See the OpenSSL advisory for specific details.
IV. Workaround
No workaround is available.
V. Solution
Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
Perform one of the following:
1) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8)
utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
[FreeBSD 15.0]
# fetch https://security.FreeBSD.org/patches/SA-26:01/openssl-15.patch
# fetch https://security.FreeBSD.org/patches/SA-26:01/openssl-15.patch.asc
# gpg --verify openssl-15.patch.asc
[FreeBSD 14.3]
# fetch https://security.FreeBSD.org/patches/SA-26:01/openssl-14.patch
# fetch https://security.FreeBSD.org/patches/SA-26:01/openssl-14.patch.asc
# gpg --verify openssl-14.patch.asc
[FreeBSD 13.5]
# fetch https://security.FreeBSD.org/patches/SA-26:01/openssl-13.patch
# fetch https://security.FreeBSD.org/patches/SA-26:01/openssl-13.patch.asc
# gpg --verify openssl-13.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
Restart all daemons that use the library, or reboot the system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ 5626e81f1a43 stable/15-n282001
releng/15.0/ 02f448fe5cc2 releng/15.0-n281004
stable/14/ ee8d50bfd59e stable/14-n273467
releng/14.3/ 65c1295c6bb0 releng/14.3-n271466
stable/13/ 1741502f8d93 stable/13-n259728
releng/13.5/ 9afc16c4e8a2 releng/13.5-n259198
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://openssl-library.org/news/secadv/20260127.txt>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-11187>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-15467>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-15468>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-15469>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-66199>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-68160>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-69418>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-69419>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-69420>
<URL:https://www.cve.org/CVERecord?id=CVE-2025-69421>
<URL:https://www.cve.org/CVERecord?id=CVE-2026-22795>
<URL:https://www.cve.org/CVERecord?id=CVE-2026-22796>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:01.openssl.asc>
