UBUNTU-CVE-2026-22791

Source
https://ubuntu.com/security/CVE-2026-22791
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22791.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-22791
Upstream
Published
2026-01-13T19:16:00Z
Modified
2026-02-23T07:09:14.448225Z
Severity
  • 6.6 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H CVSS Calculator
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.26.0, there is a heap buffer overflow vulnerability in the CKMECDHAESKEYWRAP implementation allows an attacker with local access to cause out-of-bounds writes in the host process by supplying a compressed EC public key and invoking C_WrapKey. This can lead to heap corruption, or denial-of-service.

References

Affected packages

Ubuntu:25.10 / opencryptoki

Package

Name
opencryptoki
Purl
pkg:deb/ubuntu/opencryptoki@3.25.0+dfsg-0ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.24.0+git20250128.0462717+dfsg-0ubuntu1
3.25.0+dfsg-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.25.0+dfsg-0ubuntu1",
            "binary_name": "libopencryptoki-dev"
        },
        {
            "binary_version": "3.25.0+dfsg-0ubuntu1",
            "binary_name": "libopencryptoki0"
        },
        {
            "binary_version": "3.25.0+dfsg-0ubuntu1",
            "binary_name": "opencryptoki"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22791.json"