Tony Battersby reported that incorrect cipher key and IV length processing in OpenSSL, a Secure Sockets Layer toolkit, may result in loss of confidentiality for some symmetric cipher modes. Additional details can be found in the upstream advisory: https://www.openssl.org/news/secadv/20231024.txt For the stable distribution (bookworm), this problem has been fixed in version 3.0.11-1~deb12u2. We recommend that you upgrade your openssl packages. For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl
Tony Battersby reported that incorrect cipher key and IV length processing in OpenSSL, a Secure Sockets Layer toolkit, may result in loss of confidentiality for some symmetric cipher modes.
Additional details can be found in the upstream advisory: https://www.openssl.org/news/secadv/20231024.txt
For the stable distribution (bookworm), this problem has been fixed in version 3.0.11-1~deb12u2.
We recommend that you upgrade your openssl packages.
For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl