{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"MEDIUM"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":null,
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-22796"
			},
			{
				"summary":"CVE-2026-22796 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2026/csaf-openeuler-cve-2026-22796.json"
			},
			{
				"summary":"openEuler-SA-2026-1753",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1753"
			},
			{
				"summary":"CVE-2026-22796",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-22796&packageName=edk2"
			}
		],
		"title":"openEuler cve CVE-2026-22796",
		"tracking":{
			"initial_release_date":"2026-03-30T15:49:21+08:00",
			"revision_history":[
				{
					"date":"2026-03-30T15:49:21+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2026-03-30T15:49:21+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2026-03-30T15:49:21+08:00",
			"id":"CVE-2026-22796",
			"version":"1.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"openEuler-24.03-LTS-SP2",
									"name":"openEuler-24.03-LTS-SP2"
								},
								"name":"openEuler-24.03-LTS-SP2",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-202308-32.oe2403sp2.src.rpm",
									"name":"edk2-202308-32.oe2403sp2.src.rpm"
								},
								"name":"edk2-202308-32.oe2403sp2.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-aarch64-202308-32.oe2403sp2.noarch.rpm",
									"name":"edk2-aarch64-202308-32.oe2403sp2.noarch.rpm"
								},
								"name":"edk2-aarch64-202308-32.oe2403sp2.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-help-202308-32.oe2403sp2.noarch.rpm",
									"name":"edk2-help-202308-32.oe2403sp2.noarch.rpm"
								},
								"name":"edk2-help-202308-32.oe2403sp2.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-ovmf-202308-32.oe2403sp2.noarch.rpm",
									"name":"edk2-ovmf-202308-32.oe2403sp2.noarch.rpm"
								},
								"name":"edk2-ovmf-202308-32.oe2403sp2.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"python3-edk2-devel-202308-32.oe2403sp2.noarch.rpm",
									"name":"python3-edk2-devel-202308-32.oe2403sp2.noarch.rpm"
								},
								"name":"python3-edk2-devel-202308-32.oe2403sp2.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-debuginfo-202308-32.oe2403sp2.aarch64.rpm",
									"name":"edk2-debuginfo-202308-32.oe2403sp2.aarch64.rpm"
								},
								"name":"edk2-debuginfo-202308-32.oe2403sp2.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-debugsource-202308-32.oe2403sp2.aarch64.rpm",
									"name":"edk2-debugsource-202308-32.oe2403sp2.aarch64.rpm"
								},
								"name":"edk2-debugsource-202308-32.oe2403sp2.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-devel-202308-32.oe2403sp2.aarch64.rpm",
									"name":"edk2-devel-202308-32.oe2403sp2.aarch64.rpm"
								},
								"name":"edk2-devel-202308-32.oe2403sp2.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-debuginfo-202308-32.oe2403sp2.x86_64.rpm",
									"name":"edk2-debuginfo-202308-32.oe2403sp2.x86_64.rpm"
								},
								"name":"edk2-debuginfo-202308-32.oe2403sp2.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-debugsource-202308-32.oe2403sp2.x86_64.rpm",
									"name":"edk2-debugsource-202308-32.oe2403sp2.x86_64.rpm"
								},
								"name":"edk2-debugsource-202308-32.oe2403sp2.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP2"
									},
									"product_id":"edk2-devel-202308-32.oe2403sp2.x86_64.rpm",
									"name":"edk2-devel-202308-32.oe2403sp2.x86_64.rpm"
								},
								"name":"edk2-devel-202308-32.oe2403sp2.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-202308-32.oe2403sp2.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-202308-32.oe2403sp2.src",
					"name":"edk2-202308-32.oe2403sp2.src as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-aarch64-202308-32.oe2403sp2.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-aarch64-202308-32.oe2403sp2.noarch",
					"name":"edk2-aarch64-202308-32.oe2403sp2.noarch as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-help-202308-32.oe2403sp2.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-help-202308-32.oe2403sp2.noarch",
					"name":"edk2-help-202308-32.oe2403sp2.noarch as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-ovmf-202308-32.oe2403sp2.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-ovmf-202308-32.oe2403sp2.noarch",
					"name":"edk2-ovmf-202308-32.oe2403sp2.noarch as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"python3-edk2-devel-202308-32.oe2403sp2.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:python3-edk2-devel-202308-32.oe2403sp2.noarch",
					"name":"python3-edk2-devel-202308-32.oe2403sp2.noarch as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-debuginfo-202308-32.oe2403sp2.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-debuginfo-202308-32.oe2403sp2.aarch64",
					"name":"edk2-debuginfo-202308-32.oe2403sp2.aarch64 as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-debugsource-202308-32.oe2403sp2.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-debugsource-202308-32.oe2403sp2.aarch64",
					"name":"edk2-debugsource-202308-32.oe2403sp2.aarch64 as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-devel-202308-32.oe2403sp2.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-devel-202308-32.oe2403sp2.aarch64",
					"name":"edk2-devel-202308-32.oe2403sp2.aarch64 as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-debuginfo-202308-32.oe2403sp2.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-debuginfo-202308-32.oe2403sp2.x86_64",
					"name":"edk2-debuginfo-202308-32.oe2403sp2.x86_64 as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-debugsource-202308-32.oe2403sp2.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-debugsource-202308-32.oe2403sp2.x86_64",
					"name":"edk2-debugsource-202308-32.oe2403sp2.x86_64 as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP2",
				"product_reference":"edk2-devel-202308-32.oe2403sp2.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP2:edk2-devel-202308-32.oe2403sp2.x86_64",
					"name":"edk2-devel-202308-32.oe2403sp2.x86_64 as a component of openEuler-24.03-LTS-SP2"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2026-22796",
			"notes":[
				{
					"text":"Issue summary: A type confusion vulnerability exists in the signature\nverification of signed PKCS#7 data where an ASN1_TYPE union member is\naccessed without first validating the type, causing an invalid or NULL\npointer dereference when processing malformed PKCS#7 data.\n\nImpact summary: An application performing signature verification of PKCS#7\ndata or calling directly the PKCS7_digest_from_attributes() function can be\ncaused to dereference an invalid or NULL pointer when reading, resulting in\na Denial of Service.\n\nThe function PKCS7_digest_from_attributes() accesses the message digest attribute\nvalue without validating its type. When the type is not V_ASN1_OCTET_STRING,\nthis results in accessing invalid memory through the ASN1_TYPE union, causing\na crash.\n\nExploiting this vulnerability requires an attacker to provide a malformed\nsigned PKCS#7 to an application that verifies it. The impact of the\nexploit is just a Denial of Service, the PKCS7 API is legacy and applications\nshould be using the CMS API instead. For these reasons the issue was\nassessed as Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#7 parsing implementation is outside the OpenSSL FIPS module\nboundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{
					"$ref":"$.vulnerabilities[0].product_status.fixed"
				}
			},
			"remediations":[
				{
					"product_ids":{
						"$ref":"$.vulnerabilities[0].product_status.fixed"
					},
					"details":"edk2 security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1753"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
						"version":"3.1"
					},
					"products":{
						"$ref":"$.vulnerabilities[0].product_status.fixed"
					}
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-22796"
		}
	]
}