Package "openssl"
| Name: |
openssl
|
Description: |
Secure Sockets Layer toolkit - cryptographic utility
|
| Latest version: |
3.5.3-1ubuntu3.3 |
| Release: |
questing (25.10) |
| Level: |
security |
| Repository: |
main |
| Homepage: |
https://openssl-library.org |
Links
Download "openssl"
Other versions of "openssl" in Questing
Packages in group
Deleted packages are displayed in grey.
Changelog
|
openssl (3.5.3-1ubuntu3.3) questing-security; urgency=medium
* SECURITY UPDATE: OpenSSL TLS 1.3 server may choose unexpected key
agreement group
- debian/patches/CVE-2026-2673.patch: fix group tuple handling in
DEFAULT expansion in doc/man3/SSL_CTX_set1_curves.pod,
ssl/t1_lib.c, test/tls13groupselection_test.c.
- CVE-2026-2673
* SECURITY UPDATE: NULL pointer dereference when processing an OCSP
response
- debian/patches/CVE-2026-28387.patch: dane_match_cert() should
X509_free() on ->mcert instead of OPENSSL_free() in
crypto/x509/x509_vfy.c.
- CVE-2026-28387
* SECURITY UPDATE: NULL Pointer Dereference When Processing a Delta CRL
- debian/patches/CVE-2026-28388-1.patch: fix NULL Dereference When
Delta CRL Lacks CRL Number Extension in crypto/x509/x509_vfy.c.
- debian/patches/CVE-2026-28388-2.patch: Added test in test/*.
- CVE-2026-28388
* SECURITY UPDATE: Possible NULL dereference when processing CMS
KeyAgreeRecipientInfo
- debian/patches/CVE-2026-28389.patch: Fix NULL deref in
[ec]dh_cms_set_shared_info in crypto/cms/cms_dh.c,
crypto/cms/cms_ec.c.
- CVE-2026-28389
* SECURITY UPDATE: Possible NULL Dereference When Processing CMS
KeyTransportRecipientInfo
- debian/patches/CVE-2026-28390.patch: Fix NULL deref in
rsa_cms_decrypt in crypto/cms/cms_rsa.c.
- CVE-2026-28390
* SECURITY UPDATE: Heap buffer overflow in hexadecimal conversion
- debian/patches/CVE-2026-31789.patch: avoid possible buffer overflow
in buf2hex conversion in crypto/o_str.c.
- CVE-2026-31789
* SECURITY UPDATE: Incorrect failure handling in RSA KEM RSASVE
encapsulation
- debian/patches/CVE-2026-31790-1.patch: validate RSA_public_encrypt()
result in RSASVE in providers/implementations/kem/rsa_kem.c.
- debian/patches/CVE-2026-31790-2.patch: test RSA_public_encrypt()
result in RSASVE in test/evp_extra_test.c.
- CVE-2026-31790
* Fix ppc64 FTBFS because of incorrect regex match (LP: #2137464)
- debian/patches/fix_ppc64_regex_match.patch: match last filename for
output in ecp_nistp*-ppc64.pl.
-- Marc Deslauriers <email address hidden> Tue, 07 Apr 2026 08:05:56 -0400
|
| Source diff to previous version |
| 2137464 |
crypto/ec/asm/ecp_nistp521-ppc64.pl output regex failure |
| CVE-2026-2673 |
Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration in |
| CVE-2026-28387 |
Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA reco |
| CVE-2026-28388 |
Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CR |
| CVE-2026-28389 |
Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact sum |
| CVE-2026-28390 |
Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen. Impact |
| CVE-2026-31789 |
Issue summary: Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms. Impac |
| CVE-2026-31790 |
Issue summary: Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer t |
|
|
openssl (3.5.3-1ubuntu3) questing-security; urgency=medium
* SECURITY UPDATE: Improper validation of PBMAC1 parameters in PKCS#12
MAC verification
- debian/patches/CVE-2025-11187.patch: validate salt and keylength in
PBMAC1 in crypto/pkcs12/p12_mutl.c.
- CVE-2025-11187
* SECURITY UPDATE: Stack buffer overflow in CMS AuthEnvelopedData parsing
- debian/patches/CVE-2025-15467-1.patch: correct handling of
AEAD-encrypted CMS with inadmissibly long IV in crypto/evp/evp_lib.c.
- debian/patches/CVE-2025-15467-2.patch: some comments to clarify
functions usage in crypto/asn1/evp_asn1.c.
- debian/patches/CVE-2025-15467-3.patch: test for handling of
AEAD-encrypted CMS with inadmissibly long IV in test/cmsapitest.c,
test/recipes/80-test_cmsapi.t,
test/recipes/80-test_cmsapi_data/encDataWithTooLongIV.pem.
- CVE-2025-15467
* SECURITY UPDATE: NULL dereference in SSL_CIPHER_find() function on
unknown cipher ID
- debian/patches/CVE-2025-15468.patch: add a NULL guard before
dereferencing SSL_CIPHER in ssl/quic/quic_impl.c.
- CVE-2025-15468
* SECURITY UPDATE: "openssl dgst" one-shot codepath silently truncates
inputs >16MB
- debian/patches/CVE-2025-15469.patch: report truncation in oneshot
"openssl dgst -sign" in apps/dgst.c, apps/include/apps.h,
apps/lib/apps.c, apps/pkeyutl.c.
- CVE-2025-15469
* SECURITY UPDATE: TLS 1.3 CompressedCertificate excessive memory
allocation
- debian/patches/CVE-2025-66199.patch: check the received uncompressed
certificate length in ssl/statem/statem_lib.c,
test/recipes/70-test_tls13certcomp.t, util/perl/TLSProxy/Message.pm.
- CVE-2025-66199
* SECURITY UPDATE: Heap out-of-bounds write in BIO_f_linebuffer on short
writes
- debian/patches/CVE-2025-68160.patch: fix heap buffer overflow in
BIO_f_linebuffer in crypto/bio/bf_lbuf.c.
- CVE-2025-68160
* SECURITY UPDATE: Unauthenticated/unencrypted trailing bytes with
low-level OCB function calls
- debian/patches/CVE-2025-69418.patch: fix OCB AES-NI/HW stream path
unauthenticated/unencrypted trailing bytes in crypto/modes/ocb128.c.
- CVE-2025-69418
* SECURITY UPDATE: Out of bounds write in PKCS12_get_friendlyname() UTF-8
conversion
- debian/patches/CVE-2025-69419.patch: check return code of UTF8_putc
in crypto/asn1/a_strex.c, crypto/pkcs12/p12_utl.c.
- CVE-2025-69419
* SECURITY UPDATE: Missing ASN1_TYPE validation in
TS_RESP_verify_response() function
- debian/patches/CVE-2025-69420.patch: verify ASN1 object's types
before attempting to access them as a particular type in
crypto/ts/ts_rsp_verify.c.
- CVE-2025-69420
* SECURITY UPDATE: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
- debian/patches/CVE-2025-69421.patch: add NULL check in
crypto/pkcs12/p12_decr.c.
- CVE-2025-69421
* SECURITY UPDATE: ASN1_TYPE missing validation and type confusion
- debian/patches/CVE-2026-2279x.patch: ensure ASN1 types are checked
before use in apps/s_client.c, crypto/pkcs12/p12_kiss.c,
crypto/pkcs7/pk7_doit.c.
- CVE-2026-22795
- CVE-2026-22796
-- Marc Deslauriers <email address hidden> Mon, 26 Jan 2026 07:29:59 -0500
|
| CVE-2025-11187 |
Issue summary: PBMAC1 parameters in PKCS#12 files are missing validati ... |
| CVE-2025-15467 |
Issue summary: Parsing CMS AuthEnvelopedData message with maliciously ... |
| CVE-2025-15468 |
Issue summary: If an application using the SSL_CIPHER_find() function ... |
| CVE-2025-15469 |
Issue summary: The 'openssl dgst' command-line tool silently truncates ... |
| CVE-2025-66199 |
Issue summary: A TLS 1.3 connection using certificate compression can ... |
| CVE-2025-68160 |
Issue summary: Writing large, newline-free data into a BIO chain using ... |
| CVE-2025-69418 |
Issue summary: When using the low-level OCB API directly with AES-NI o ... |
| CVE-2025-69419 |
Issue summary: Calling PKCS12_get_friendlyname() function on a malicio ... |
| CVE-2025-69420 |
Issue summary: A type confusion vulnerability exists in the TimeStamp ... |
| CVE-2025-69421 |
Issue summary: Processing a malformed PKCS#12 file can trigger a NULL ... |
| CVE-2026-22795 |
Issue summary: An invalid or NULL pointer dereference can happen in an ... |
| CVE-2026-22796 |
Issue summary: A type confusion vulnerability exists in the signature ... |
|
About
-
Send Feedback to @ubuntu_updates