[CLSA-2026:1770917492] Fix CVE(s): CVE-2025-69421
Type:
security
Severity:
Important
Release date:
2026-02-12 17:31:37 UTC
Description:
* SECURITY UPDATE: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference - debian/patches/CVE-2025-69421.patch: Check oct argument for NULL - CVE-2025-69421
Updated packages:
  • libssl-dev_1.0.2g-1ubuntu4.21+tuxcare.els13_amd64.deb
    sha:702943afe3b652b21bc5f9ea1d99f81229612ca4
  • libssl-doc_1.0.2g-1ubuntu4.21+tuxcare.els13_all.deb
    sha:54b552304766df2815901587f97334c2558d669f
  • libssl1.0.0_1.0.2g-1ubuntu4.21+tuxcare.els13_amd64.deb
    sha:d48ce14545871229ca7acad71af2da4b7db063be
  • openssl_1.0.2g-1ubuntu4.21+tuxcare.els13_amd64.deb
    sha:6b0d9d84c5ad041248c3ac67422446f282f8040c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.