重要: kusanagi-openssl 脆弱性情報

概要

公開日時 2026-01-29
深刻度 重要
モジュール kusanagi-openssl
対象 KUSANAGI 9, Business Edition, Page Speed Technology, Security Edition

脆弱性情報

kusanagi-opensslの脆弱性情報を公開しました。修正した脆弱性は以下の通りとなります。

  • CVE-2025-11187: Improper validation of PBMAC1 parameters in PKCS#12 MAC verification
  • CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing
  • CVE-2025-15468: NULL dereference in SSL_CIPHER_find() function on unknown cipher ID
  • CVE-2025-15469: 'openssl dgst' one-shot codepath silently truncates inputs 16MB
  • CVE-2025-66199: TLS 1.3 CompressedCertificate excessive memory allocation
  • CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes
  • CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls
  • CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion
  • CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function
  • CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function
  • CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing
  • CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function

CVE詳細

CVSSスコアや脆弱性の報告者等、詳細については、以下の情報を参照してください。
なお、CVEの状況によっては情報がまだ公開されていない場合があります。

アップデートしたパッケージ

This product uses the NVD API but is not endorsed or certified by the NVD.
超高速CMS実行環境 KUSANAGI
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.