OpenSSL Advisory: January 27th, 2026 (BoringSSL Not Affected)

OpenSSL have published a security advisory. Here's how it affects BoringSSL:

CVESummarySeverity in OpenSSLImpact to BoringSSL
CVE-2025-11187Improper validation of PBMAC1 parameters in PKCS#12 MAC verificationModerateNot affected, issue was introduced after fork. BoringSSL has an independent, minimal PKCS#12 implementation.
CVE-2025-15467Stack buffer overflow in CMS AuthEnvelopedData parsingHighNot affected, issue was introduced after fork. BoringSSL removed the affected module in the initial fork.
CVE-2025-15468NULL dereference in SSL_CIPHER_find() function on unknown cipher IDLowNot affected, issue was introduced after fork.
CVE-2025-15469“openssl dgst” one-shot codepath silently truncates inputs >16MBLowNot affected, issue was introduced after fork.
CVE-2025-66199TLS 1.3 CompressedCertificate excessive memory allocationLowNot affected, issue was introduced after fork. BoringSSL has an independent implementation of RFC 8879 and correctly checks the uncompressed length.
CVE-2025-68160Heap out-of-bounds write in BIO_f_linebuffer on short writesLowNot affected; BoringSSL removed the affected code, and other VMS support, in the initial fork.
CVE-2025-69418Unauthenticated/unencrypted trailing bytes with low-level OCB function callsLowNot affected; BoringSSL removed the affected code in the initial fork.
CVE-2025-69419Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversionLowNot affected, issue was introduced after fork.
CVE-2025-69420Missing ASN1_TYPE validation in TS_RESP_verify_response() functionLowNot affected, issue was introduced after fork, BoringSSL removed the affected module in the initial fork.
CVE-2025-69421NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex functionLowNot affected; BoringSSL removed the affected code in the initial fork and has an independent, minimal PKCS#12 implementation.
CVE-2026-22795Missing ASN1_TYPE validation in PKCS#12 parsingLowNot affected; BoringSSL removed the affected code in the initial fork and has an independent, minimal PKCS#12 implementation.
CVE-2026-22796ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes()LowNot affected, issue was introduced after fork. BoringSSL removed the affected module in the initial fork.

ASN1_TYPE Type Confusion

Several issues in this advisory are due to the OpenSSL ASN1_TYPE structure, which represents an ASN.1 ANY value. The ASN1_TYPE structure contains a C union. All accesses must take care to check the type field before accessing the union.

While BoringSSL was not affected by any of the type confusion issues, it does share the ASN1_TYPE structure itself. The ASN1_TYPE structure is part of OpenSSL’s public API and embedded in many parts of the library. As part of triaging this advisory, we audited accesses to ASN1_TYPE within the library and found no instances of type confusion.