Date: unknown
Location: lists.debian.org
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6113-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 27, 2026 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : openssl CVE ID : CVE-2025-11187 CVE-2025-15467 CVE-2025-15468 CVE-2025-15469 CVE-2025-66199 CVE-2025-68160 CVE-2025-69418 CVE-2025-69419 CVE-2025-69420 CVE-2025-69421 CVE-2026-22795 CVE-2026-22796 Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit, which may result in denial of service, information leaks, or potentially remote code execution. Additional details can be found in the upstream advisory: https://openssl-library.org/news/secadv/20260127.txt For the oldstable distribution (bookworm), these problems have been fixed in version 3.0.18-1~deb12u2. For the stable distribution (trixie), these problems have been fixed in version 3.5.4-1~deb13u2. We recommend that you upgrade your openssl packages. For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAml5FdJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SKtA/+IyoTTDFYwQULKPX72b+Dl8kTdYpPz6Rk+RJjxsl5e2Ubgfp5kb2EJOIh H89sKCNzQaB9J2CvCeVK0mGC+akZuUo/vqf/sWWUBIwqRtRkN0sz2ttBs2LPvQ6h 81500DEbi+AldIgRjtkfC75mOcka4GKeRBz3z63//sd0OoIssLNnUMw7xo/5fYBY e2lGPLk04GHBgWOoTzo3htCXs1XR2ffJ1hyFyoZcFSeYB/B3HR9eAhJqg6FlEzM3 fJ/UHzJl5FYo0TXfluD+OSrGoxJGLLsIhNggqJPk1ZWTJruqDJ4rVVAmbvfk+dlh zOI8teNkati0+64DqBGxVCJEiNJb9o6ERg5ojnXglGq/X81lrvZtM5VIYpiHH9fZ Qm+1fTAFnlCnmI6iCBMjmQLB9B1m6woud/HSx73FU9JMrnO0bBfRELRG7uA6SjzX 4clBskjbidD/R8xxdFjY+mcEvHxNKTeoQE25L//f2lDdlq0XDZdr9AeBeOiqAWfW 2iKyg1p3WU4t7VszEJH0QkNVX/gs/ijAcMfWIX7TAhBKkzPXefQHIUltgxxDi6m4 lMjJKfhsiAF7Roqf23gPKFXnoSh7AO/e2sFy5EpPdwVxQv3hrnhLb5ERTAIwKmdt c9EY8BC9Yi5NhzFRYZk+X8xKdvK3dNUfSIAlEndfyxdmHNvNM5U= =tR3u -----END PGP SIGNATURE-----