[ubuntu/questing-security] openssl 3.5.3-1ubuntu3 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Jan 27 17:37:16 UTC 2026
openssl (3.5.3-1ubuntu3) questing-security; urgency=medium
* SECURITY UPDATE: Improper validation of PBMAC1 parameters in PKCS#12
MAC verification
- debian/patches/CVE-2025-11187.patch: validate salt and keylength in
PBMAC1 in crypto/pkcs12/p12_mutl.c.
- CVE-2025-11187
* SECURITY UPDATE: Stack buffer overflow in CMS AuthEnvelopedData parsing
- debian/patches/CVE-2025-15467-1.patch: correct handling of
AEAD-encrypted CMS with inadmissibly long IV in crypto/evp/evp_lib.c.
- debian/patches/CVE-2025-15467-2.patch: some comments to clarify
functions usage in crypto/asn1/evp_asn1.c.
- debian/patches/CVE-2025-15467-3.patch: test for handling of
AEAD-encrypted CMS with inadmissibly long IV in test/cmsapitest.c,
test/recipes/80-test_cmsapi.t,
test/recipes/80-test_cmsapi_data/encDataWithTooLongIV.pem.
- CVE-2025-15467
* SECURITY UPDATE: NULL dereference in SSL_CIPHER_find() function on
unknown cipher ID
- debian/patches/CVE-2025-15468.patch: add a NULL guard before
dereferencing SSL_CIPHER in ssl/quic/quic_impl.c.
- CVE-2025-15468
* SECURITY UPDATE: "openssl dgst" one-shot codepath silently truncates
inputs >16MB
- debian/patches/CVE-2025-15469.patch: report truncation in oneshot
"openssl dgst -sign" in apps/dgst.c, apps/include/apps.h,
apps/lib/apps.c, apps/pkeyutl.c.
- CVE-2025-15469
* SECURITY UPDATE: TLS 1.3 CompressedCertificate excessive memory
allocation
- debian/patches/CVE-2025-66199.patch: check the received uncompressed
certificate length in ssl/statem/statem_lib.c,
test/recipes/70-test_tls13certcomp.t, util/perl/TLSProxy/Message.pm.
- CVE-2025-66199
* SECURITY UPDATE: Heap out-of-bounds write in BIO_f_linebuffer on short
writes
- debian/patches/CVE-2025-68160.patch: fix heap buffer overflow in
BIO_f_linebuffer in crypto/bio/bf_lbuf.c.
- CVE-2025-68160
* SECURITY UPDATE: Unauthenticated/unencrypted trailing bytes with
low-level OCB function calls
- debian/patches/CVE-2025-69418.patch: fix OCB AES-NI/HW stream path
unauthenticated/unencrypted trailing bytes in crypto/modes/ocb128.c.
- CVE-2025-69418
* SECURITY UPDATE: Out of bounds write in PKCS12_get_friendlyname() UTF-8
conversion
- debian/patches/CVE-2025-69419.patch: check return code of UTF8_putc
in crypto/asn1/a_strex.c, crypto/pkcs12/p12_utl.c.
- CVE-2025-69419
* SECURITY UPDATE: Missing ASN1_TYPE validation in
TS_RESP_verify_response() function
- debian/patches/CVE-2025-69420.patch: verify ASN1 object's types
before attempting to access them as a particular type in
crypto/ts/ts_rsp_verify.c.
- CVE-2025-69420
* SECURITY UPDATE: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
- debian/patches/CVE-2025-69421.patch: add NULL check in
crypto/pkcs12/p12_decr.c.
- CVE-2025-69421
* SECURITY UPDATE: ASN1_TYPE missing validation and type confusion
- debian/patches/CVE-2026-2279x.patch: ensure ASN1 types are checked
before use in apps/s_client.c, crypto/pkcs12/p12_kiss.c,
crypto/pkcs7/pk7_doit.c.
- CVE-2026-22795
- CVE-2026-22796
Date: 2026-01-26 16:14:10.777871+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/openssl/3.5.3-1ubuntu3
-------------- next part --------------
Sorry, changesfile not available.
More information about the Questing-changes
mailing list