[Git][security-tracker-team/security-tracker][master] Add new openssl issues
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jan 27 14:53:27 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0da289eb by Salvatore Bonaccorso at 2026-01-27T15:52:29+01:00
Add new openssl issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,48 @@
+CVE-2025-11187 [Improper validation of PBMAC1 parameters in PKCS#12 MAC verification]
+ - openssl <unfixed>
+ [bookworm] - openssl <not-affected> (Vulnerable code introduced later)
+ [bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-15467 [Stack buffer overflow in CMS AuthEnvelopedData parsing]
+ - openssl <unfixed>
+ [bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-15468 [NULL dereference in SSL_CIPHER_find() function on unknown cipher ID]
+ - openssl <unfixed>
+ [bookworm] - openssl <not-affected> (Vulnerable code introduced later)
+ [bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-15469 ["openssl dgst" one-shot codepath silently truncates inputs >16MB]
+ - openssl <unfixed>
+ [bookworm] - openssl <not-affected> (Vulnerable code introduced later)
+ [bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-66199 [TLS 1.3 CompressedCertificate excessive memory allocation]
+ - openssl <unfixed>
+ [bookworm] - openssl <not-affected> (Vulnerable code introduced later)
+ [bullseye] - openssl <not-affected> (Vulnerable code introduced later)
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-68160 [Heap out-of-bounds write in BIO_f_linebuffer on short writes]
+ - openssl <unfixed>
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-69418 [Unauthenticated/unencrypted trailing bytes with low-level OCB function calls]
+ - openssl <unfixed>
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-69419 [Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion]
+ - openssl <unfixed>
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-69420 [Missing ASN1_TYPE validation in TS_RESP_verify_response() function]
+ - openssl <unfixed>
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2025-69421 [NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function]
+ - openssl <unfixed>
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2026-22795 [Missing ASN1_TYPE validation in PKCS#12 parsing]
+ - openssl <unfixed>
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
+CVE-2026-22796 [ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function]
+ - openssl <unfixed>
+ NOTE: https://openssl-library.org/news/secadv/20260127.txt
CVE-2026-XXXX [RUSTSEC-2026-0005: Potential use-after-free in oneshot when used asynchronously]
- rust-oneshot <unfixed>
NOTE: https://rustsec.org/advisories/RUSTSEC-2026-0005.html
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0da289eb1bcb41e8bdf8b7421978c5b3a1c8ba90
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0da289eb1bcb41e8bdf8b7421978c5b3a1c8ba90
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260127/fb590551/attachment.htm>
More information about the debian-security-tracker-commits
mailing list