[Pkg-openssl-devel] openssl_3.5.4-1~deb13u2_source.changes ACCEPTED into proposed-updates

Debian FTP Masters ftpmaster at ftp-master.debian.org
Thu Jan 29 18:48:32 GMT 2026


Thank you for your contribution to Debian.



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 24 Jan 2026 16:50:07 +0100
Source: openssl
Architecture: source
Version: 3.5.4-1~deb13u2
Distribution: trixie-security
Urgency: medium
Maintainer: Debian OpenSSL Team <pkg-openssl-devel at alioth-lists.debian.net>
Changed-By: Sebastian Andrzej Siewior <sebastian at breakpoint.cc>
Changes:
 openssl (3.5.4-1~deb13u2) trixie-security; urgency=medium
 .
   * CVE-2025-11187 (Improper validation of PBMAC1 parameters in PKCS#12 MAC
     verification)
   * CVE-2025-15467 (Stack buffer overflow in CMS AuthEnvelopedData parsing)
   * CVE-2025-15468 (NULL dereference in SSL_CIPHER_find() function on unknown
     cipher ID)
   * CVE-2025-15469 ("openssl dgst" one-shot codepath silently truncates inputs
     >16MB)
   * CVE-2025-66199 (TLS 1.3 CompressedCertificate excessive memory allocation)
   * CVE-2025-68160 (Heap out-of-bounds write in BIO_f_linebuffer on short
     writes)
   * CVE-2025-69418 (Unauthenticated/unencrypted trailing bytes with low-level
     OCB function calls)
   * CVE-2025-69419 (Out of bounds write in PKCS12_get_friendlyname() UTF-8
     conversion)
   * CVE-2025-69420 (Missing ASN1_TYPE validation in TS_RESP_verify_response()
     function)
   * CVE-2025-69421 (NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
     function)
   * CVE-2026-22795 (Missing ASN1_TYPE validation in PKCS#12 parsing)
   * CVE-2026-22796 (ASN1_TYPE Type Confusion in the
     PKCS7_digest_from_attributes() function)
Checksums-Sha1:
 287729fb89e8fbfd6e544091a70b7d8e5007f5be 2707 openssl_3.5.4-1~deb13u2.dsc
 b75daac8e10f189abe28a076ba5905d363e4801f 53190367 openssl_3.5.4.orig.tar.gz
 5f2dc895c3124ec1a04e17f2aa679f86ec49227c 833 openssl_3.5.4.orig.tar.gz.asc
 2a1f2a04b97dcdfa1622496197eb85c0207936f2 65020 openssl_3.5.4-1~deb13u2.debian.tar.xz
Checksums-Sha256:
 646eb71bec0d395e564f1dd88e26ddede052200d37293bb03aa1372897b17dd8 2707 openssl_3.5.4-1~deb13u2.dsc
 967311f84955316969bdb1d8d4b983718ef42338639c621ec4c34fddef355e99 53190367 openssl_3.5.4.orig.tar.gz
 cfcabcfc6e43237392e0ab42e2326fceb71037036c2adaa7ecc7e251778e38f4 833 openssl_3.5.4.orig.tar.gz.asc
 f9edcab4e1d849a6c29e1c7821516c19d7dead327bb78b015d07445622922437 65020 openssl_3.5.4-1~deb13u2.debian.tar.xz
Files:
 18b606ea5aef77be07e92a57f4c93408 2707 utils optional openssl_3.5.4-1~deb13u2.dsc
 570a7ab371147b6ba72c6d0fed93131f 53190367 utils optional openssl_3.5.4.orig.tar.gz
 fc505832a9796504dcd48c14fd34c4cb 833 utils optional openssl_3.5.4.orig.tar.gz.asc
 eaf4b0d539d98d82a781db1aa41c479d 65020 utils optional openssl_3.5.4-1~deb13u2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=5J2v
-----END PGP SIGNATURE-----

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-openssl-devel/attachments/20260129/93606a4e/attachment.sig>


More information about the Pkg-openssl-devel mailing list