UBUNTU-CVE-2026-22795

Source
https://ubuntu.com/security/CVE-2026-22795
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-22795
Upstream
Downstream
Related
Published
2026-01-27T00:00:00Z
Modified
2026-02-06T22:00:57.200281Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service. A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read. The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.

References

Affected packages

Ubuntu:22.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@3.0.2-0ubuntu1.21?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.2-0ubuntu1.21

Affected versions

1.*
1.1.1l-1ubuntu1
3.*
3.0.0-1ubuntu1
3.0.1-0ubuntu1
3.0.2-0ubuntu1
3.0.2-0ubuntu1.1
3.0.2-0ubuntu1.2
3.0.2-0ubuntu1.4
3.0.2-0ubuntu1.5
3.0.2-0ubuntu1.6
3.0.2-0ubuntu1.7
3.0.2-0ubuntu1.8
3.0.2-0ubuntu1.9
3.0.2-0ubuntu1.10
3.0.2-0ubuntu1.12
3.0.2-0ubuntu1.13
3.0.2-0ubuntu1.14
3.0.2-0ubuntu1.15
3.0.2-0ubuntu1.16
3.0.2-0ubuntu1.17
3.0.2-0ubuntu1.18
3.0.2-0ubuntu1.19
3.0.2-0ubuntu1.20

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "3.0.2-0ubuntu1.21"
        },
        {
            "binary_name": "libssl3",
            "binary_version": "3.0.2-0ubuntu1.21"
        },
        {
            "binary_name": "openssl",
            "binary_version": "3.0.2-0ubuntu1.21"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:24.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@3.0.13-0ubuntu3.7?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.13-0ubuntu3.7

Affected versions

3.*
3.0.10-1ubuntu2
3.0.10-1ubuntu2.1
3.0.10-1ubuntu3
3.0.10-1ubuntu4
3.0.13-0ubuntu2
3.0.13-0ubuntu3
3.0.13-0ubuntu3.1
3.0.13-0ubuntu3.2
3.0.13-0ubuntu3.3
3.0.13-0ubuntu3.4
3.0.13-0ubuntu3.5
3.0.13-0ubuntu3.6

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "3.0.13-0ubuntu3.7"
        },
        {
            "binary_name": "libssl3t64",
            "binary_version": "3.0.13-0ubuntu3.7"
        },
        {
            "binary_name": "openssl",
            "binary_version": "3.0.13-0ubuntu3.7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:25.10
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@3.5.3-1ubuntu3?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.3-1ubuntu3

Affected versions

3.*
3.4.1-1ubuntu3
3.5.0-2ubuntu1
3.5.2-1ubuntu1
3.5.3-1ubuntu2

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "3.5.3-1ubuntu3"
        },
        {
            "binary_name": "libssl3t64",
            "binary_version": "3.5.3-1ubuntu3"
        },
        {
            "binary_name": "openssl",
            "binary_version": "3.5.3-1ubuntu3"
        },
        {
            "binary_name": "openssl-provider-legacy",
            "binary_version": "3.5.3-1ubuntu3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:16.04:LTS
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@4.2.6~dfsg-1ubuntu4.2+esm3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.10.25~dfsg2-2ubuntu1
4.*
4.2.2~dfsg-1
4.2.3~dfsg-1
4.2.4~dfsg-1ubuntu1
4.2.4~dfsg-2
4.2.6~dfsg-1ubuntu1
4.2.6~dfsg-1ubuntu4
4.2.6~dfsg-1ubuntu4.1
4.2.6~dfsg-1ubuntu4.2
4.2.6~dfsg-1ubuntu4.2+esm1
4.2.6~dfsg-1ubuntu4.2+esm2
4.2.6~dfsg-1ubuntu4.2+esm3

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "binaries": [
        {
            "binary_name": "nodejs",
            "binary_version": "4.2.6~dfsg-1ubuntu4.2+esm3"
        },
        {
            "binary_name": "nodejs-dev",
            "binary_version": "4.2.6~dfsg-1ubuntu4.2+esm3"
        },
        {
            "binary_name": "nodejs-legacy",
            "binary_version": "4.2.6~dfsg-1ubuntu4.2+esm3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:18.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@1.1.1-1ubuntu2.1~18.04.23+esm7?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1-1ubuntu2.1~18.04.23+esm7

Affected versions

1.*
1.0.2g-1ubuntu13
1.0.2g-1ubuntu14
1.0.2n-1ubuntu1
1.1.0g-2ubuntu1
1.1.0g-2ubuntu2
1.1.0g-2ubuntu3
1.1.0g-2ubuntu4
1.1.0g-2ubuntu4.1
1.1.0g-2ubuntu4.3
1.1.1-1ubuntu2.1~18.04.1
1.1.1-1ubuntu2.1~18.04.2
1.1.1-1ubuntu2.1~18.04.3
1.1.1-1ubuntu2.1~18.04.4
1.1.1-1ubuntu2.1~18.04.5
1.1.1-1ubuntu2.1~18.04.6
1.1.1-1ubuntu2.1~18.04.7
1.1.1-1ubuntu2.1~18.04.8
1.1.1-1ubuntu2.1~18.04.9
1.1.1-1ubuntu2.1~18.04.10
1.1.1-1ubuntu2.1~18.04.13
1.1.1-1ubuntu2.1~18.04.14
1.1.1-1ubuntu2.1~18.04.15
1.1.1-1ubuntu2.1~18.04.17
1.1.1-1ubuntu2.1~18.04.19
1.1.1-1ubuntu2.1~18.04.20
1.1.1-1ubuntu2.1~18.04.21
1.1.1-1ubuntu2.1~18.04.22
1.1.1-1ubuntu2.1~18.04.23
1.1.1-1ubuntu2.1~18.04.23+esm1
1.1.1-1ubuntu2.1~18.04.23+esm3
1.1.1-1ubuntu2.1~18.04.23+esm4
1.1.1-1ubuntu2.1~18.04.23+esm5
1.1.1-1ubuntu2.1~18.04.23+esm6

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "1.1.1-1ubuntu2.1~18.04.23+esm7"
        },
        {
            "binary_name": "libssl1.1",
            "binary_version": "1.1.1-1ubuntu2.1~18.04.23+esm7"
        },
        {
            "binary_name": "openssl",
            "binary_version": "1.1.1-1ubuntu2.1~18.04.23+esm7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@8.10.0~dfsg-2ubuntu0.4+esm6?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.11.4~dfsg-1ubuntu1
6.11.4~dfsg-1ubuntu2
6.12.0~dfsg-1ubuntu1
6.12.0~dfsg-2ubuntu1
6.12.0~dfsg-2ubuntu2
8.*
8.10.0~dfsg-2
8.10.0~dfsg-2ubuntu0.2
8.10.0~dfsg-2ubuntu0.3
8.10.0~dfsg-2ubuntu0.4
8.10.0~dfsg-2ubuntu0.4+esm1
8.10.0~dfsg-2ubuntu0.4+esm2
8.10.0~dfsg-2ubuntu0.4+esm3
8.10.0~dfsg-2ubuntu0.4+esm4
8.10.0~dfsg-2ubuntu0.4+esm5
8.10.0~dfsg-2ubuntu0.4+esm6

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "binaries": [
        {
            "binary_name": "nodejs",
            "binary_version": "8.10.0~dfsg-2ubuntu0.4+esm6"
        },
        {
            "binary_name": "nodejs-dev",
            "binary_version": "8.10.0~dfsg-2ubuntu0.4+esm6"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:20.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@1.1.1f-1ubuntu2.24+esm2?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1f-1ubuntu2.24+esm2

Affected versions

1.*
1.1.1c-1ubuntu4
1.1.1d-2ubuntu3
1.1.1d-2ubuntu6
1.1.1f-1ubuntu1
1.1.1f-1ubuntu2
1.1.1f-1ubuntu2.1
1.1.1f-1ubuntu2.2
1.1.1f-1ubuntu2.3
1.1.1f-1ubuntu2.4
1.1.1f-1ubuntu2.5
1.1.1f-1ubuntu2.8
1.1.1f-1ubuntu2.9
1.1.1f-1ubuntu2.10
1.1.1f-1ubuntu2.11
1.1.1f-1ubuntu2.12
1.1.1f-1ubuntu2.13
1.1.1f-1ubuntu2.15
1.1.1f-1ubuntu2.16
1.1.1f-1ubuntu2.17
1.1.1f-1ubuntu2.18
1.1.1f-1ubuntu2.19
1.1.1f-1ubuntu2.20
1.1.1f-1ubuntu2.21
1.1.1f-1ubuntu2.22
1.1.1f-1ubuntu2.23
1.1.1f-1ubuntu2.24
1.1.1f-1ubuntu2.24+esm1

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "1.1.1f-1ubuntu2.24+esm2"
        },
        {
            "binary_name": "libssl1.1",
            "binary_version": "1.1.1f-1ubuntu2.24+esm2"
        },
        {
            "binary_name": "openssl",
            "binary_version": "1.1.1f-1ubuntu2.24+esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:22.04:LTS
nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs@12.22.9~dfsg-1ubuntu3.6+esm2?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

12.*
12.22.5~dfsg-5ubuntu1
12.22.7~dfsg-2ubuntu1
12.22.7~dfsg-2ubuntu3
12.22.9~dfsg-1ubuntu2
12.22.9~dfsg-1ubuntu3
12.22.9~dfsg-1ubuntu3.1
12.22.9~dfsg-1ubuntu3.2
12.22.9~dfsg-1ubuntu3.3
12.22.9~dfsg-1ubuntu3.4
12.22.9~dfsg-1ubuntu3.5
12.22.9~dfsg-1ubuntu3.6
12.22.9~dfsg-1ubuntu3.6+esm2

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "binaries": [
        {
            "binary_name": "libnode-dev",
            "binary_version": "12.22.9~dfsg-1ubuntu3.6+esm2"
        },
        {
            "binary_name": "libnode72",
            "binary_version": "12.22.9~dfsg-1ubuntu3.6+esm2"
        },
        {
            "binary_name": "nodejs",
            "binary_version": "12.22.9~dfsg-1ubuntu3.6+esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:FIPS-preview:22.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@3.0.2-0ubuntu1.12+Fips1?arch=source&distro=fips-preview/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.0.2-0ubuntu1.10+Fips1
3.0.2-0ubuntu1.12+Fips1

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "3.0.2-0ubuntu1.12+Fips1"
        },
        {
            "binary_name": "libssl3",
            "binary_version": "3.0.2-0ubuntu1.12+Fips1"
        },
        {
            "binary_name": "openssl",
            "binary_version": "3.0.2-0ubuntu1.12+Fips1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:FIPS-updates:18.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@1.1.1-1ubuntu2.fips.2.1~18.04.23.7?arch=source&distro=fips-updates/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1-1ubuntu2.fips.2.1~18.04.23.7

Affected versions

1.*
1.1.1-1ubuntu2.fips.2.1~18.04.5.1
1.1.1-1ubuntu2.fips.2.1~18.04.6.1
1.1.1-1ubuntu2.fips.2.1~18.04.7.1
1.1.1-1ubuntu2.fips.2.1~18.04.9.1
1.1.1-1ubuntu2.fips.2.1~18.04.9.2
1.1.1-1ubuntu2.fips.2.1~18.04.9.3
1.1.1-1ubuntu2.fips.2.1~18.04.13.2
1.1.1-1ubuntu2.fips.2.1~18.04.15
1.1.1-1ubuntu2.fips.2.1~18.04.15.1
1.1.1-1ubuntu2.fips.2.1~18.04.15.2
1.1.1-1ubuntu2.fips.2.1~18.04.17
1.1.1-1ubuntu2.fips.2.1~18.04.20
1.1.1-1ubuntu2.fips.2.1~18.04.21
1.1.1-1ubuntu2.fips.2.1~18.04.22
1.1.1-1ubuntu2.fips.2.1~18.04.23
1.1.1-1ubuntu2.fips.2.1~18.04.23.3
1.1.1-1ubuntu2.fips.2.1~18.04.23.4
1.1.1-1ubuntu2.fips.2.1~18.04.23.5
1.1.1-1ubuntu2.fips.2.1~18.04.23.6

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "1.1.1-1ubuntu2.fips.2.1~18.04.23.7"
        },
        {
            "binary_name": "libssl1.1",
            "binary_version": "1.1.1-1ubuntu2.fips.2.1~18.04.23.7"
        },
        {
            "binary_name": "libssl1.1-hmac",
            "binary_version": "1.1.1-1ubuntu2.fips.2.1~18.04.23.7"
        },
        {
            "binary_name": "openssl",
            "binary_version": "1.1.1-1ubuntu2.fips.2.1~18.04.23.7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:FIPS-updates:20.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@1.1.1f-1ubuntu2.fips.24.2?arch=source&distro=fips-updates/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1f-1ubuntu2.fips.24.2

Affected versions

1.*
1.1.1f-1ubuntu2.fips.7
1.1.1f-1ubuntu2.fips.7.2
1.1.1f-1ubuntu2.fips.12
1.1.1f-1ubuntu2.fips.13
1.1.1f-1ubuntu2.fips.13.1
1.1.1f-1ubuntu2.fips.16
1.1.1f-1ubuntu2.fips.17
1.1.1f-1ubuntu2.fips.18
1.1.1f-1ubuntu2.fips.19
1.1.1f-1ubuntu2.fips.20
1.1.1f-1ubuntu2.fips.21
1.1.1f-1ubuntu2.fips.22
1.1.1f-1ubuntu2.fips.24
1.1.1f-1ubuntu2.fips.24.1

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "1.1.1f-1ubuntu2.fips.24.2"
        },
        {
            "binary_name": "libssl1.1",
            "binary_version": "1.1.1f-1ubuntu2.fips.24.2"
        },
        {
            "binary_name": "libssl1.1-hmac",
            "binary_version": "1.1.1f-1ubuntu2.fips.24.2"
        },
        {
            "binary_name": "openssl",
            "binary_version": "1.1.1f-1ubuntu2.fips.24.2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:FIPS-updates:22.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@3.0.2-0ubuntu1.21+Fips1?arch=source&distro=fips-updates/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.2-0ubuntu1.21+Fips1

Affected versions

3.*
3.0.2-0ubuntu1.10+Fips1
3.0.2-0ubuntu1.12+Fips1
3.0.2-0ubuntu1.14+Fips1
3.0.2-0ubuntu1.15+Fips1
3.0.2-0ubuntu1.16+Fips1
3.0.2-0ubuntu1.17+Fips1
3.0.2-0ubuntu1.18+Fips1
3.0.2-0ubuntu1.19+Fips1
3.0.2-0ubuntu1.20+Fips1

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "3.0.2-0ubuntu1.21+Fips1"
        },
        {
            "binary_name": "libssl3",
            "binary_version": "3.0.2-0ubuntu1.21+Fips1"
        },
        {
            "binary_name": "openssl",
            "binary_version": "3.0.2-0ubuntu1.21+Fips1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:FIPS:18.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@1.1.1-1ubuntu2.fips.2.1~18.04.15.2?arch=source&distro=fips/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.1.1-1ubuntu2.fips.2.1~18.04.3.1
1.1.1-1ubuntu2.fips.2.1~18.04.15.2

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "1.1.1-1ubuntu2.fips.2.1~18.04.15.2"
        },
        {
            "binary_name": "libssl1.1",
            "binary_version": "1.1.1-1ubuntu2.fips.2.1~18.04.15.2"
        },
        {
            "binary_name": "libssl1.1-hmac",
            "binary_version": "1.1.1-1ubuntu2.fips.2.1~18.04.15.2"
        },
        {
            "binary_name": "openssl",
            "binary_version": "1.1.1-1ubuntu2.fips.2.1~18.04.15.2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"
Ubuntu:Pro:FIPS:20.04:LTS
openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@1.1.1f-1ubuntu2.fips.7.1?arch=source&distro=fips/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.1.1f-1ubuntu2.fips.2.8
1.1.1f-1ubuntu2.fips.7.1

Ecosystem specific

{
    "priority_reason": "OpenSSL developers have rated this issue to be low severity",
    "binaries": [
        {
            "binary_name": "libssl-dev",
            "binary_version": "1.1.1f-1ubuntu2.fips.7.1"
        },
        {
            "binary_name": "libssl1.1",
            "binary_version": "1.1.1f-1ubuntu2.fips.7.1"
        },
        {
            "binary_name": "libssl1.1-hmac",
            "binary_version": "1.1.1f-1ubuntu2.fips.7.1"
        },
        {
            "binary_name": "openssl",
            "binary_version": "1.1.1f-1ubuntu2.fips.7.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22795.json"