[ubuntu/resolute-proposed] openssl 3.5.4-1ubuntu1 (Accepted)
Ravi Kant Sharma
ravi.kant.sharma at canonical.com
Fri Jan 23 17:56:17 UTC 2026
openssl (3.5.4-1ubuntu1) resolute; urgency=medium
* Match last filename for output in ecp_nistp521-ppc64.pl (LP: #2137464)
- d/p/regex_match_ecp_nistp521-ppc64.patch
* Drop patches, merged upstream
- d/p/CVE-2025-9230.patch
- d/p/CVE-2025-9231-1.patch
- d/p/CVE-2025-9231-2.patch
- d/p/CVE-2025-9232.patch
* Merge with Debian unstable (LP: #2133492). Remaining changes:
- Use perl:native in the autopkgtest for installability on i386.
- Symlink copyright/changelog.Debian.gz in libssl3* to libssl-dev/openssl
- Disable LTO with which the codebase is generally incompatible (LP #2058017)
- Default config reads crypto-config and /etc/ssl/openssl.cnf.d dropins
- Don't enable or package anything FIPS (LP #2087955)
- Match last filename for output in ecp_nistp521-ppc64.pl (LP #2137464)
- fips patches (debian/patches/fips):
- crypto: Add kernel FIPS mode detection
- crypto: Automatically use the FIPS provider...
- apps/speed: Omit unavailable algorithms in FIPS mode
- apps: pass -propquery arg to the libctx DRBG fetches
- test: Ensure encoding runs with the correct context...
- Add Ubuntu-specific defines to help FIPS certification (LP #2073991)
+ UBUNTU_OSSL_SELF_TEST_DESC_PCT_DH
+ UBUNTU_OSSL_PROV_FIPS_PARAM_UNAPPROVED_USAGE
openssl (3.5.4-1) unstable; urgency=medium
* Import 3.5.4
- CVE-2025-9230 (Out-of-bounds read & write in RFC 3211 KEK Unwrap)
- CVE-2025-9231 (Timing side-channel in SM2 algorithm on 64 bit ARM)
- CVE-2025-9232 (Out-of-bounds read in HTTP client no_proxy handling)
Date: Thu, 08 Jan 2026 15:53:39 +0100
Changed-By: Ravi Kant Sharma <ravi.kant.sharma at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Julian Andres Klode <julian.klode at canonical.com>
https://launchpad.net/ubuntu/+source/openssl/3.5.4-1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Thu, 08 Jan 2026 15:53:39 +0100
Source: openssl
Built-For-Profiles: noudeb
Architecture: source
Version: 3.5.4-1ubuntu1
Distribution: resolute
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Ravi Kant Sharma <ravi.kant.sharma at canonical.com>
Launchpad-Bugs-Fixed: 2133492 2137464
Changes:
openssl (3.5.4-1ubuntu1) resolute; urgency=medium
.
* Match last filename for output in ecp_nistp521-ppc64.pl (LP: #2137464)
- d/p/regex_match_ecp_nistp521-ppc64.patch
* Drop patches, merged upstream
- d/p/CVE-2025-9230.patch
- d/p/CVE-2025-9231-1.patch
- d/p/CVE-2025-9231-2.patch
- d/p/CVE-2025-9232.patch
* Merge with Debian unstable (LP: #2133492). Remaining changes:
- Use perl:native in the autopkgtest for installability on i386.
- Symlink copyright/changelog.Debian.gz in libssl3* to libssl-dev/openssl
- Disable LTO with which the codebase is generally incompatible (LP #2058017)
- Default config reads crypto-config and /etc/ssl/openssl.cnf.d dropins
- Don't enable or package anything FIPS (LP #2087955)
- Match last filename for output in ecp_nistp521-ppc64.pl (LP #2137464)
- fips patches (debian/patches/fips):
- crypto: Add kernel FIPS mode detection
- crypto: Automatically use the FIPS provider...
- apps/speed: Omit unavailable algorithms in FIPS mode
- apps: pass -propquery arg to the libctx DRBG fetches
- test: Ensure encoding runs with the correct context...
- Add Ubuntu-specific defines to help FIPS certification (LP #2073991)
+ UBUNTU_OSSL_SELF_TEST_DESC_PCT_DH
+ UBUNTU_OSSL_PROV_FIPS_PARAM_UNAPPROVED_USAGE
.
openssl (3.5.4-1) unstable; urgency=medium
.
* Import 3.5.4
- CVE-2025-9230 (Out-of-bounds read & write in RFC 3211 KEK Unwrap)
- CVE-2025-9231 (Timing side-channel in SM2 algorithm on 64 bit ARM)
- CVE-2025-9232 (Out-of-bounds read in HTTP client no_proxy handling)
Checksums-Sha1:
0cd0d57f0b07cd8ed357670cf017825991bbf318 2865 openssl_3.5.4-1ubuntu1.dsc
b75daac8e10f189abe28a076ba5905d363e4801f 53190367 openssl_3.5.4.orig.tar.gz
5f2dc895c3124ec1a04e17f2aa679f86ec49227c 833 openssl_3.5.4.orig.tar.gz.asc
2e37f3750b86733d2bac47f80a93a8e536150b0d 65920 openssl_3.5.4-1ubuntu1.debian.tar.xz
890eced7302df95a8c693ee310208ef7d142146a 6673 openssl_3.5.4-1ubuntu1_source.buildinfo
Checksums-Sha256:
7832322ff46fb82576ea14fcb8f230d7a3e14ef193c7afcb3b9bc21dfeb3d449 2865 openssl_3.5.4-1ubuntu1.dsc
967311f84955316969bdb1d8d4b983718ef42338639c621ec4c34fddef355e99 53190367 openssl_3.5.4.orig.tar.gz
cfcabcfc6e43237392e0ab42e2326fceb71037036c2adaa7ecc7e251778e38f4 833 openssl_3.5.4.orig.tar.gz.asc
fda9561c0c0bcdf2144782b3400ae7393116db9a2d95579f99b6c2c071171335 65920 openssl_3.5.4-1ubuntu1.debian.tar.xz
e975a6f14577c1f26c237178449f313f0128a4b93b8e469f9a7856d3b8a89b72 6673 openssl_3.5.4-1ubuntu1_source.buildinfo
Files:
fd975ff6bd00d80564b3c4a547fc7d91 2865 utils optional openssl_3.5.4-1ubuntu1.dsc
570a7ab371147b6ba72c6d0fed93131f 53190367 utils optional openssl_3.5.4.orig.tar.gz
fc505832a9796504dcd48c14fd34c4cb 833 utils optional openssl_3.5.4.orig.tar.gz.asc
1d25c90f8b67fd56459674bfee0fdd46 65920 utils optional openssl_3.5.4-1ubuntu1.debian.tar.xz
158190a3dd66440dc6a84ae9871f9272 6673 utils optional openssl_3.5.4-1ubuntu1_source.buildinfo
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at alioth-lists.debian.net>
Vcs-Git: https://git.launchpad.net/~juliank/ubuntu/+source/openssl
Vcs-Git-Commit: a8a8f565e249312ec72336760779b0445ee8a65b
Vcs-Git-Ref: refs/heads/debian/sid
More information about the Resolute-changes
mailing list