[ubuntu/questing-proposed] openssl 3.5.3-1ubuntu2 (Accepted)

Hlib Korzhynskyy hlib.korzhynskyy at canonical.com
Wed Oct 1 16:55:34 UTC 2025


openssl (3.5.3-1ubuntu2) questing; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read & write in RFC 3211 KEK Unwrap
    - debian/patches/CVE-2025-9230.patch: fix incorrect check of unwrapped
      key size in crypto/cms/cms_pwri.c.
    - CVE-2025-9230
  * SECURITY UPDATE: Timing side-channel in SM2 algorithm on 64 bit ARM
    - debian/patches/CVE-2025-9231-1.patch: use constant time modular
      inversion in crypto/ec/ecp_sm2p256.c.
    - debian/patches/CVE-2025-9231-2.patch: remove unused code in
      crypto/ec/ecp_sm2p256.c.
    - CVE-2025-9231
  * SECURITY UPDATE: Out-of-bounds read in HTTP client no_proxy handling
    - debian/patches/CVE-2025-9232.patch: add missing terminating NUL byte
      in crypto/http/http_lib.c.
    - CVE-2025-9232

Date: Tue, 30 Sep 2025 16:17:50 -0230
Changed-By: Hlib Korzhynskyy <hlib.korzhynskyy at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/openssl/3.5.3-1ubuntu2
-------------- next part --------------
Format: 1.8
Date: Tue, 30 Sep 2025 16:17:50 -0230
Source: openssl
Built-For-Profiles: noudeb
Architecture: source
Version: 3.5.3-1ubuntu2
Distribution: questing
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Hlib Korzhynskyy <hlib.korzhynskyy at canonical.com>
Changes:
 openssl (3.5.3-1ubuntu2) questing; urgency=medium
 .
   * SECURITY UPDATE: Out-of-bounds read & write in RFC 3211 KEK Unwrap
     - debian/patches/CVE-2025-9230.patch: fix incorrect check of unwrapped
       key size in crypto/cms/cms_pwri.c.
     - CVE-2025-9230
   * SECURITY UPDATE: Timing side-channel in SM2 algorithm on 64 bit ARM
     - debian/patches/CVE-2025-9231-1.patch: use constant time modular
       inversion in crypto/ec/ecp_sm2p256.c.
     - debian/patches/CVE-2025-9231-2.patch: remove unused code in
       crypto/ec/ecp_sm2p256.c.
     - CVE-2025-9231
   * SECURITY UPDATE: Out-of-bounds read in HTTP client no_proxy handling
     - debian/patches/CVE-2025-9232.patch: add missing terminating NUL byte
       in crypto/http/http_lib.c.
     - CVE-2025-9232
Checksums-Sha1:
 2d1d7c5413cd12d6d62ae0c6ae7954ac519829f2 2600 openssl_3.5.3-1ubuntu2.dsc
 b17291fdfec2262564659dc02af4a91acd31da20 67424 openssl_3.5.3-1ubuntu2.debian.tar.xz
 3a0073b9cdddd69e6a8895b318074bbda584d7cc 6458 openssl_3.5.3-1ubuntu2_source.buildinfo
Checksums-Sha256:
 4eac20d0794e772ce44e4f08ff1ad10bead35eb2d8ab872240d88fbe71d7ceb3 2600 openssl_3.5.3-1ubuntu2.dsc
 aad93da3c75450bf06227e59fd3267fc08094e7bacfcb98dcd3944917a0222b8 67424 openssl_3.5.3-1ubuntu2.debian.tar.xz
 0e9ca1fc8ddb1423cb97800e9490a7953e6fc437dd6843ea46970acf335ceba3 6458 openssl_3.5.3-1ubuntu2_source.buildinfo
Files:
 c0d6985ae2f17bb5fb4813a3b6532ce7 2600 utils optional openssl_3.5.3-1ubuntu2.dsc
 846edd23558a68dfaadb3c29ddccd02f 67424 utils optional openssl_3.5.3-1ubuntu2.debian.tar.xz
 4073830422f4930a4bfb16222daf26bb 6458 utils optional openssl_3.5.3-1ubuntu2_source.buildinfo
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at alioth-lists.debian.net>


More information about the Questing-changes mailing list