|
|
Log in / Subscribe / Register

Ubuntu alert USN-7980-1 (openssl)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7980-1] OpenSSL vulnerabilities
Date:  Tue, 27 Jan 2026 19:57:02 +0000
Message-ID:  <E1vkpBO-0006Tv-96@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-7980-1 January 27, 2026 openssl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS Summary: Several security issues were fixed in OpenSSL. Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools Details: Stanislav Fort, Petr Šimeček, and Hamza discovered that OpenSSL incorrectly validated PBMAC1 parameters when doing PKCS#12 MAC verification. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 25.10. (CVE-2025-11187) Stanislav Fort discovered that OpenSSL incorrectly parsed CMS AuthEnvelopedData messages. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2025-15467) Stanislav Fort discovered that OpenSSL incorrectly handled memory in the SSL_CIPHER_find() function. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 25.10. (CVE-2025-15468) Stanislav Fort discovered that the OpenSSL "openssl dgst" command line tool incorrectly truncated data to 16MB. An attacker could posibly use this issue to hide unauthenticated data beyond the 16MB limit. This issue only affected Ubuntu 25.10. (CVE-2025-15469) Tomas Dulka and Stanislav Fort discovered that OpenSSL incorrectly handled memory with TLS 1.3 connections using certificate compression. An attacker could possibly use this issue to consume resources, leading to a denial of service. This issue only affected Ubuntu 25.10. (CVE-2025-66199) Petr Simecek and Stanislav Fort discovered that OpenSSL incorrectly handled memory when writing large data into a BIO chain. An attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-68160) Stanislav Fort discovered that the OpenSSL OCB API could incorrectly leave final partial blocks unencrypted and unauthenticated. An attacker could possibly use this issue to read or tamper with the affected final bytes. (CVE-2025-69418) Stanislav Fort discovered that OpenSSL incorrectly handled the PKCS12_get_friendlyname() utf-8 conversion. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2025-69419) Luigino Camastra discovered that OpenSSL incorrectly handled ASN1_TYPE validation in the TS_RESP_verify_response() function. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2025-69420) Luigino Camastra discovered that OpenSSL incorrectly handled memory in the PKCS12_item_decrypt_d2i_ex function. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2025-69421) Luigino Camastra discovered that OpenSSL incorrectly handled ASN1_TYPE validation in PKCS#12 parsing. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2026-22795) Luigino Camastra discovered that OpenSSL incorrectly handled ASN1_TYPE validation in the PKCS7_digest_from_attributes() function. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2026-22796) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 libssl3t64 3.5.3-1ubuntu3 openssl 3.5.3-1ubuntu3 Ubuntu 24.04 LTS libssl3t64 3.0.13-0ubuntu3.7 openssl 3.0.13-0ubuntu3.7 Ubuntu 22.04 LTS libssl3 3.0.2-0ubuntu1.21 openssl 3.0.2-0ubuntu1.21 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7980-1 CVE-2025-11187, CVE-2025-15467, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796 Package Information: https://launchpad.net/ubuntu/+source/openssl/3.5.3-1ubuntu3 https://launchpad.net/ubuntu/+source/openssl/3.0.13-0ubun... https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubunt...


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAml5GFcACgkQcpJm3tlz hgEdKBAAlC+Xu8p9VbtRh79T7Q66nFWtu8FGm9uQdwIbInf/bHV/wbZEi7Mnlxge PcWrfv5VDk/VIounUmfoRGNoli0+ZN/MeakDnYCjU6Xlx31VZgMrVmU/+3miWtCj ggcA2Yl6E8QX4XlwrJEXz7z2y6s57e+cltIwjM5RH3mB/hCRrM7DV/okl+71BBzq 35NRpEJz0YMswXwWZcrqxyYj3jHkyXUYCBwc6zHUb3sHSNz3mucAOHNy/9NBUdjD qWG3VUB/jyMdFk4g/YY+Oq/xpmuaJCPglfTaqqnhrkWvgE+ufBWWamvKfYNJXyil Mdm+7gZs5B63sT1F3VznF+6SqXwlLb45Vco0714oEWQ2awSXhG1aaOhp6JKIYvc9 CBbNF86j0xRvsxaIvZM/mwWox/2XdDZFkXd8VJBRVj/vq66ApghJEdsw4QKaiGV6 f+7A9RsZaGg9Ow2LuZo7s0hm6D5xM1TENHRniQX4H+mZU6O7VnqL1NEHAwU+xFvf 0Lr3pHascQSLD+y3uKVAOOfS8Ph8pehJbKGl/jEsRIq7RuxY8AEUCukxeM3V2y21 CIXisdm3DWrEtDm+OQ1d8yqbIft30GskzzWKZ5EBMRJ2t539lq/HyAdx2u813lBu GLw2T515q19UIDFWfV+b6RT9dlCv4KEovx1KTwmr8f3dEJLwFAg= =+Mkd -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds