DSA-5532-1 openssl -- security update

Related Vulnerabilities: CVE-2023-5363  

Tony Battersby reported that incorrect cipher key and IV length processing in OpenSSL, a Secure Sockets Layer toolkit, may result in loss of confidentiality for some symmetric cipher modes. Additional details can be found in the upstream advisory: https://www.openssl.org/news/secadv/20231024.txt For the stable distribution (bookworm), this problem has been fixed in version 3.0.11-1~deb12u2. We recommend that you upgrade your openssl packages. For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl

Debian Security Advisory

DSA-5532-1 openssl -- security update

Date Reported:
24 Oct 2023
Affected Packages:
openssl
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2023-5363.
More information:

Tony Battersby reported that incorrect cipher key and IV length processing in OpenSSL, a Secure Sockets Layer toolkit, may result in loss of confidentiality for some symmetric cipher modes.

Additional details can be found in the upstream advisory: https://www.openssl.org/news/secadv/20231024.txt

For the stable distribution (bookworm), this problem has been fixed in version 3.0.11-1~deb12u2.

We recommend that you upgrade your openssl packages.

For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl