Bug 35077 - openssl new security issues CVE-2025-11187, CVE-2025-1546[7-9], CVE-2025-66199, CVE-2025-68160, CVE-2025-6941[89], CVE-2025-6942[01], CVE-2026-2279[56]
Summary: openssl new security issues CVE-2025-11187, CVE-2025-1546[7-9], CVE-2025-6619...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Nicolas Salguero
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2026-01-28 10:19 CET by Nicolas Salguero
Modified: 2026-01-30 01:40 CET (History)
3 users (show)

See Also:
Source RPM: openssl-3.0.18-1.mga9.src.rpm
CVE: CVE-2025-15467, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796
Status comment:
herman.viaene: test_passed_mga9_64+


Attachments

Description Nicolas Salguero 2026-01-28 10:19:50 CET
References:
https://www.openwall.com/lists/oss-security/2026/01/27/5
https://www.openwall.com/lists/oss-security/2026/01/27/7
https://openssl-library.org/news/secadv/20260127.txt

CVE-2025-11187, CVE-2025-1546[89], CVE-2025-66199 only affect Cauldron.
Nicolas Salguero 2026-01-28 10:22:08 CET

Source RPM: (none) => openssl-3.5.4-1.mga10.src.rpm, openssl-3.0.18-1.mga9.src.rpm
Status comment: (none) => Fixed upstream in 3.5.5 and 3.0.19
CVE: (none) => CVE-2025-11187, CVE-2025-15467, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796
Flags: (none) => affects_mga9+
Whiteboard: (none) => MGA9TOO

Nicolas Salguero 2026-01-28 16:58:04 CET

QA Contact: security => nicolas.salguero

Comment 1 Nicolas Salguero 2026-01-28 17:32:36 CET
For Cauldron, I asked for a freeze move.


Suggested advisory:
========================

The updated packages fix security vulnerabilities:

Stack buffer overflow in CMS AuthEnvelopedData parsing. (CVE-2025-15467)

Heap out-of-bounds write in BIO_f_linebuffer on short writes. (CVE-2025-68160)

Unauthenticated/unencrypted trailing bytes with low-level OCB function calls. (CVE-2025-69418)

Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion. (CVE-2025-69419)

Missing ASN1_TYPE validation in TS_RESP_verify_response() function. (CVE-2025-69420)

NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function. (CVE-2025-69421)

Missing ASN1_TYPE validation in PKCS#12 parsing. (CVE-2026-22795)

ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function. (CVE-2026-22796)

References:
https://www.openwall.com/lists/oss-security/2026/01/27/5
https://www.openwall.com/lists/oss-security/2026/01/27/7
https://openssl-library.org/news/secadv/20260127.txt
========================

Updated packages in core/updates_testing:
========================
lib(64)openssl-devel-3.0.19-1.mga9
lib(64)openssl-static-devel-3.0.19-1.mga9
lib(64)openssl3-3.0.19-1.mga9
openssl-3.0.19-1.mga9
openssl-perl-3.0.19-1.mga9

from SRPM:
openssl-3.0.19-1.mga9.src.rpm

Status: NEW => ASSIGNED
Assignee: bugsquad => qa-bugs
Version: Cauldron => 9
Whiteboard: MGA9TOO => (none)
CVE: CVE-2025-11187, CVE-2025-15467, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796 => CVE-2025-15467, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796
Status comment: Fixed upstream in 3.5.5 and 3.0.19 => (none)
Flags: affects_mga9+ => (none)
Source RPM: openssl-3.5.4-1.mga10.src.rpm, openssl-3.0.18-1.mga9.src.rpm => openssl-3.0.18-1.mga9.src.rpm

Comment 2 Herman Viaene 2026-01-29 09:21:15 CET
MGA9-64 server Plasma Wayland on  Compaq H000SB.
No installation issues, omitting static-devel.
Ref bug 33942
$ openssl s_client -connect mageia.org:443
CONNECTED(00000003)
depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G2
verify return:1
depth=1 C = FR, O = Gandi SAS, CN = GandiCert
verify return:1
depth=0 CN = *.mageia.org
verify return:1
---
Certificate chain
 0 s:CN = *.mageia.org
   i:C = FR, O = Gandi SAS, CN = GandiCert
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Feb 11 00:00:00 2025 GMT; NotAfter: Feb 10 23:59:59 2026 GMT
 1 s:C = FR, O = Gandi SAS, CN = GandiCert
   i:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G2
   a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA256
   v:NotBefore: Apr 17 00:00:00 2024 GMT; NotAfter: Apr 16 23:59:59 2034 GMT
etc.....

$ openssl ciphers -v
TLS_AES_256_GCM_SHA384         TLSv1.3 Kx=any      Au=any   Enc=AESGCM(256)            Mac=AEAD
TLS_CHACHA20_POLY1305_SHA256   TLSv1.3 Kx=any      Au=any   Enc=CHACHA20/POLY1305(256) Mac=AEAD
TLS_AES_128_GCM_SHA256         TLSv1.3 Kx=any      Au=any   Enc=AESGCM(128)            Mac=AEAD
TLS_AES_128_CCM_SHA256         TLSv1.3 Kx=any      Au=any   Enc=AESCCM(128)            Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384  TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256)            Mac=AEAD
etc.....

$ openssl speed rsa
Doing 512 bits private rsa's for 10s: 27697 512 bits private RSA's in 9.32s
Doing 512 bits public rsa's for 10s: 398107 512 bits public RSA's in 9.41s
Doing 1024 bits private rsa's for 10s: 7922 1024 bits private RSA's in 8.89s
Doing 1024 bits public rsa's for 10s: 138652 1024 bits public RSA's in 8.76s
At the end
CPUINFO: OPENSSL_ia32cap=0x3ed8220b078bffff:0x8
                  sign    verify    sign/s verify/s
rsa  512 bits 0.000336s 0.000024s   2971.8  42306.8
rsa 1024 bits 0.001122s 0.000063s    891.1  15827.9
rsa 2048 bits 0.007633s 0.000214s    131.0   4663.6
rsa 3072 bits 0.023264s 0.000458s     43.0   2184.8
rsa 4096 bits 0.052734s 0.000786s     19.0   1272.4
rsa 7680 bits 0.379600s 0.002643s      2.6    378.4
rsa 15360 bits 2.475000s 0.010144s      0.4     98.6

Looks all OK.

Flags: (none) => test_passed_mga9_64+
Whiteboard: (none) => MGA9-64-OK
CC: (none) => herman.viaene

Comment 3 Thomas Andrews 2026-01-29 18:54:10 CET
Validating.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

katnatek 2026-01-29 23:24:37 CET

Keywords: (none) => advisory

Comment 4 Mageia Robot 2026-01-30 01:40:32 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2026-0029.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.