Debian 10264 Published by

An openssl security update has been released for Debian GNU/Linux 12 to address an issue where an incorrect cipher key and IV length processing may result in loss of confidentiality for some symmetric cipher modes.



[SECURITY] [DSA 5532-1] openssl security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5532-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 24, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openssl
CVE ID : CVE-2023-5363

Tony Battersby reported that incorrect cipher key and IV length
processing in OpenSSL, a Secure Sockets Layer toolkit, may result in
loss of confidentiality for some symmetric cipher modes.

Additional details can be found in the upstream advisory:
https://www.openssl.org/news/secadv/20231024.txt

For the stable distribution (bookworm), this problem has been fixed in
version 3.0.11-1~deb12u2.

We recommend that you upgrade your openssl packages.

For the detailed security status of openssl please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/openssl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/