CVE-2025-66199

NameCVE-2025-66199
DescriptionIssue summary: A TLS 1.3 connection using certificate compression can ...
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)bullseye1.1.1w-0+deb11u1fixed
bullseye (security)1.1.1w-0+deb11u4fixed
bookworm3.0.18-1~deb12u1fixed
bookworm (security)3.0.18-1~deb12u2fixed
trixie3.5.4-1~deb13u1vulnerable
trixie (security)3.5.4-1~deb13u2fixed
forky, sid3.5.4-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsourcebullseye(not affected)
opensslsourcebookworm(not affected)
opensslsourcetrixie3.5.4-1~deb13u2
opensslsource(unstable)3.5.5-1

Notes

[bookworm] - openssl <not-affected> (Vulnerable code introduced later)
[bullseye] - openssl <not-affected> (Vulnerable code introduced later)
https://openssl-library.org/news/secadv/20260127.txt
Fixed by: https://github.com/openssl/openssl/commit/895150b5e021d16b52fb32b97e1dd12f20448be5 (openssl-3.5.5)

Search for package or bug name: Reporting problems