🔔 Dear deepin Users and Community Members,

Recently, OpenSSL has released multiple security vulnerability fix announcements, involving 13 security vulnerabilities, including 2 High/Medium-risk vulnerabilities. To ensure the security of your system, we strongly recommend all users upgrade the relevant packages as soon as possible.

 

I. Vulnerability Information

The CVE identifiers involved in this fix are as follows:

CVE-2025-9230, CVE-2025-9231, CVE-2025-9232, CVE-2025-15467, CVE-2025-15468,

CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420,

CVE-2025-69421, CVE-2026-22795, CVE-2026-22796

 

Key High/Medium Risk Vulnerability Fixes

  • CVE-2025-15467 | High

CMS AuthEnvelopedData Parsing Stack Buffer Overflow: This vulnerability could lead to Remote Code Execution (RCE) under specific conditions. Immediate updating is advised.

  • CVE-2025-11187 | Moderate

Missing PKCS#12 PBMAC1 Parameter Validation: Lack of necessary validation could trigger a stack-based buffer overflow.

 

II. Fixed Version Information

Fixed Version: 3.2.4-0deepin6 (for packages libssl3 and openssl)

Note: Versions lower than 3.2.4-0deepin6 are not patched against these vulnerabilities.

Command to Check Version:

apt policy libssl3 openssl

System Update Method:

sudo apt update
sudo apt upgrade libssl3 openssl

 

III. Timeline (All times in Beijing Time)

  • Jan 28, 01:18 — Upstream OpenSSL official security advisory released.
  • Jan 28, 09:39 — deepin initiated vulnerability tracking and analysis.
  • Jan 28, 16:32 — Patch adaptation completed, PR submitted, and entered the build pipeline.
  • Jan 30, 15:51 — Testing completed, update ready for repository push.

 

References

Leave a Reply