[Git][security-tracker-team/security-tracker][master] Add new openssl issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jan 27 14:53:27 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0da289eb by Salvatore Bonaccorso at 2026-01-27T15:52:29+01:00
Add new openssl issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,48 @@
+CVE-2025-11187 [Improper validation of PBMAC1 parameters in PKCS#12 MAC verification]
+	- openssl <unfixed>
+	[bookworm] - openssl <not-affected> (Vulnerable code introduced later)
+	[bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-15467 [Stack buffer overflow in CMS AuthEnvelopedData parsing]
+	- openssl <unfixed>
+	[bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-15468 [NULL dereference in SSL_CIPHER_find() function on unknown cipher ID]
+	- openssl <unfixed>
+	[bookworm] - openssl <not-affected> (Vulnerable code introduced later)
+	[bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-15469 ["openssl dgst" one-shot codepath silently truncates inputs >16MB]
+	- openssl <unfixed>
+	[bookworm] - openssl <not-affected> (Vulnerable code introduced later)
+	[bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-66199 [TLS 1.3 CompressedCertificate excessive memory allocation]
+	- openssl <unfixed>
+	[bookworm] - openssl <not-affected> (Vulnerable code introduced later)
+	[bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-68160 [Heap out-of-bounds write in BIO_f_linebuffer on short writes]
+	- openssl <unfixed>
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-69418 [Unauthenticated/unencrypted trailing bytes with low-level OCB function calls]
+	- openssl <unfixed>
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-69419 [Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion]
+	- openssl <unfixed>
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-69420 [Missing ASN1_TYPE validation in TS_RESP_verify_response() function]
+	- openssl <unfixed>
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-69421 [NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function]
+	- openssl <unfixed>
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2026-22795 [Missing ASN1_TYPE validation in PKCS#12 parsing]
+	- openssl <unfixed>
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2026-22796 [ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function]
+	- openssl <unfixed>
+	NOTE: https://openssl-library.org/news/secadv/20260127.txt
 CVE-2026-XXXX [RUSTSEC-2026-0005: Potential use-after-free in oneshot when used asynchronously]
 	- rust-oneshot <unfixed>
 	NOTE: https://rustsec.org/advisories/RUSTSEC-2026-0005.html



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0da289eb1bcb41e8bdf8b7421978c5b3a1c8ba90

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0da289eb1bcb41e8bdf8b7421978c5b3a1c8ba90
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260127/fb590551/attachment.htm>


More information about the debian-security-tracker-commits mailing list