UbuntuUpdates.org

Package "openssl"

Name: openssl

Description:

Secure Sockets Layer toolkit - cryptographic utility

Latest version: 3.5.3-1ubuntu3
Release: questing (25.10)
Level: updates
Repository: main
Homepage: https://openssl-library.org

Links


Download "openssl"


Other versions of "openssl" in Questing

Repository Area Version
base main 3.5.3-1ubuntu2
security main 3.5.3-1ubuntu3

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.5.3-1ubuntu3 2026-01-28 00:28:44 UTC

  openssl (3.5.3-1ubuntu3) questing-security; urgency=medium

  * SECURITY UPDATE: Improper validation of PBMAC1 parameters in PKCS#12
    MAC verification
    - debian/patches/CVE-2025-11187.patch: validate salt and keylength in
      PBMAC1 in crypto/pkcs12/p12_mutl.c.
    - CVE-2025-11187
  * SECURITY UPDATE: Stack buffer overflow in CMS AuthEnvelopedData parsing
    - debian/patches/CVE-2025-15467-1.patch: correct handling of
      AEAD-encrypted CMS with inadmissibly long IV in crypto/evp/evp_lib.c.
    - debian/patches/CVE-2025-15467-2.patch: some comments to clarify
      functions usage in crypto/asn1/evp_asn1.c.
    - debian/patches/CVE-2025-15467-3.patch: test for handling of
      AEAD-encrypted CMS with inadmissibly long IV in test/cmsapitest.c,
      test/recipes/80-test_cmsapi.t,
      test/recipes/80-test_cmsapi_data/encDataWithTooLongIV.pem.
    - CVE-2025-15467
  * SECURITY UPDATE: NULL dereference in SSL_CIPHER_find() function on
    unknown cipher ID
    - debian/patches/CVE-2025-15468.patch: add a NULL guard before
      dereferencing SSL_CIPHER in ssl/quic/quic_impl.c.
    - CVE-2025-15468
  * SECURITY UPDATE: "openssl dgst" one-shot codepath silently truncates
    inputs >16MB
    - debian/patches/CVE-2025-15469.patch: report truncation in oneshot
      "openssl dgst -sign" in apps/dgst.c, apps/include/apps.h,
      apps/lib/apps.c, apps/pkeyutl.c.
    - CVE-2025-15469
  * SECURITY UPDATE: TLS 1.3 CompressedCertificate excessive memory
    allocation
    - debian/patches/CVE-2025-66199.patch: check the received uncompressed
      certificate length in ssl/statem/statem_lib.c,
      test/recipes/70-test_tls13certcomp.t, util/perl/TLSProxy/Message.pm.
    - CVE-2025-66199
  * SECURITY UPDATE: Heap out-of-bounds write in BIO_f_linebuffer on short
    writes
    - debian/patches/CVE-2025-68160.patch: fix heap buffer overflow in
      BIO_f_linebuffer in crypto/bio/bf_lbuf.c.
    - CVE-2025-68160
  * SECURITY UPDATE: Unauthenticated/unencrypted trailing bytes with
    low-level OCB function calls
    - debian/patches/CVE-2025-69418.patch: fix OCB AES-NI/HW stream path
      unauthenticated/unencrypted trailing bytes in crypto/modes/ocb128.c.
    - CVE-2025-69418
  * SECURITY UPDATE: Out of bounds write in PKCS12_get_friendlyname() UTF-8
    conversion
    - debian/patches/CVE-2025-69419.patch: check return code of UTF8_putc
      in crypto/asn1/a_strex.c, crypto/pkcs12/p12_utl.c.
    - CVE-2025-69419
  * SECURITY UPDATE: Missing ASN1_TYPE validation in
    TS_RESP_verify_response() function
    - debian/patches/CVE-2025-69420.patch: verify ASN1 object's types
      before attempting to access them as a particular type in
      crypto/ts/ts_rsp_verify.c.
    - CVE-2025-69420
  * SECURITY UPDATE: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
    - debian/patches/CVE-2025-69421.patch: add NULL check in
      crypto/pkcs12/p12_decr.c.
    - CVE-2025-69421
  * SECURITY UPDATE: ASN1_TYPE missing validation and type confusion
    - debian/patches/CVE-2026-2279x.patch: ensure ASN1 types are checked
      before use in apps/s_client.c, crypto/pkcs12/p12_kiss.c,
      crypto/pkcs7/pk7_doit.c.
    - CVE-2026-22795
    - CVE-2026-22796

 -- Marc Deslauriers <email address hidden> Mon, 26 Jan 2026 07:29:59 -0500

CVE-2025-11187 Issue summary: PBMAC1 parameters in PKCS#12 files are missing validati ...
CVE-2025-15467 Issue summary: Parsing CMS AuthEnvelopedData message with maliciously ...
CVE-2025-15468 Issue summary: If an application using the SSL_CIPHER_find() function ...
CVE-2025-15469 Issue summary: The 'openssl dgst' command-line tool silently truncates ...
CVE-2025-66199 Issue summary: A TLS 1.3 connection using certificate compression can ...
CVE-2025-68160 Issue summary: Writing large, newline-free data into a BIO chain using ...
CVE-2025-69418 Issue summary: When using the low-level OCB API directly with AES-NI o ...
CVE-2025-69419 Issue summary: Calling PKCS12_get_friendlyname() function on a malicio ...
CVE-2025-69420 Issue summary: A type confusion vulnerability exists in the TimeStamp ...
CVE-2025-69421 Issue summary: Processing a malformed PKCS#12 file can trigger a NULL ...
CVE-2026-22795 Issue summary: An invalid or NULL pointer dereference can happen in an ...
CVE-2026-22796 Issue summary: A type confusion vulnerability exists in the signature ...



About   -   Send Feedback to @ubuntu_updates