<reportApi _class='io.jenkins.plugins.analysis.core.restapi.ReportApi'><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>govway</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/linkitaly/govway</fileName><fingerprint>FALLBACK-840d6efb</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-28390: OsPackageVulnerability

openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing

For additional help see: **Vulnerability CVE-2026-28390**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|libssl3|3.5.6-r0|[CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)|

Issue summary: During processing of a crafted CMS EnvelopedData message
with KeyTransportRecipientInfo a NULL pointer dereference can happen.

Impact summary: Applications that process attacker-controlled CMS data may
crash before authentication or cryptographic operations occur resulting in
Denial of Service.

When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with
RSA-OAEP encryption is processed, the optional parameters field of
RSA-OAEP SourceFunc algorithm identifier is examined without checking
for its presence. This results in a NULL pointer dereference if the field
is missing.

Applications and services that call CMS_decrypt() on untrusted input
(e.g., S/MIME processing or CMS-based protocols) are vulnerable.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the affected code is outside the OpenSSL FIPS module boundary.

Package: libcrypto3
Installed Version: 3.5.5-r0
Vulnerability CVE-2026-28390
Severity: HIGH
Fixed Version: 3.5.6-r0
Link: [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>govway(1,0): CVE-2026-28390: : CVE-2026-28390: OsPackageVulnerability

openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing

For additional help see: **Vulnerability CVE-2026-28390**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|libssl3|3.5.6-r0|[CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)|

Issue summary: During processing of a crafted CMS EnvelopedData message
with KeyTransportRecipientInfo a NULL pointer dereference can happen.

Impact summary: Applications that process attacker-controlled CMS data may
crash before authentication or cryptographic operations occur resulting in
Denial of Service.

When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with
RSA-OAEP encryption is processed, the optional parameters field of
RSA-OAEP SourceFunc algorithm identifier is examined without checking
for its presence. This results in a NULL pointer dereference if the field
is missing.

Applications and services that call CMS_decrypt() on untrusted input
(e.g., S/MIME processing or CMS-based protocols) are vulnerable.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the affected code is outside the OpenSSL FIPS module boundary.

Package: libcrypto3
Installed Version: 3.5.5-r0
Vulnerability CVE-2026-28390
Severity: HIGH
Fixed Version: 3.5.6-r0
Link: [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)</toString><type>CVE-2026-28390</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>govway</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/linkitaly/govway</fileName><fingerprint>FALLBACK-840d6efb</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-28390: OsPackageVulnerability

openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing

For additional help see: **Vulnerability CVE-2026-28390**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|libssl3|3.5.6-r0|[CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)|

Issue summary: During processing of a crafted CMS EnvelopedData message
with KeyTransportRecipientInfo a NULL pointer dereference can happen.

Impact summary: Applications that process attacker-controlled CMS data may
crash before authentication or cryptographic operations occur resulting in
Denial of Service.

When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with
RSA-OAEP encryption is processed, the optional parameters field of
RSA-OAEP SourceFunc algorithm identifier is examined without checking
for its presence. This results in a NULL pointer dereference if the field
is missing.

Applications and services that call CMS_decrypt() on untrusted input
(e.g., S/MIME processing or CMS-based protocols) are vulnerable.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the affected code is outside the OpenSSL FIPS module boundary.

Package: libssl3
Installed Version: 3.5.5-r0
Vulnerability CVE-2026-28390
Severity: HIGH
Fixed Version: 3.5.6-r0
Link: [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>govway(1,0): CVE-2026-28390: : CVE-2026-28390: OsPackageVulnerability

openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing

For additional help see: **Vulnerability CVE-2026-28390**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|libssl3|3.5.6-r0|[CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)|

Issue summary: During processing of a crafted CMS EnvelopedData message
with KeyTransportRecipientInfo a NULL pointer dereference can happen.

Impact summary: Applications that process attacker-controlled CMS data may
crash before authentication or cryptographic operations occur resulting in
Denial of Service.

When a CMS EnvelopedData message that uses KeyTransportRecipientInfo with
RSA-OAEP encryption is processed, the optional parameters field of
RSA-OAEP SourceFunc algorithm identifier is examined without checking
for its presence. This results in a NULL pointer dereference if the field
is missing.

Applications and services that call CMS_decrypt() on untrusted input
(e.g., S/MIME processing or CMS-based protocols) are vulnerable.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the affected code is outside the OpenSSL FIPS module boundary.

Package: libssl3
Installed Version: 3.5.5-r0
Vulnerability CVE-2026-28390
Severity: HIGH
Fixed Version: 3.5.6-r0
Link: [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390)</toString><type>CVE-2026-28390</type></issue><size>2</size><toString>2 warnings (high: 2)</toString></reportApi>