Debian is really good about backporting any security fixes to existing stable releases. The deb12u2 at the end of the version means 3.0.11 been updated twice already for Debian 12, besides the 3.0.10 to 3.0.11 update they did when 3.0.10 proved unpatchable.
So Debian watches openssl closely and fixes those issues:
Code: Select all
openssl (3.0.11-1~deb12u2) bookworm-security; urgency=medium
* CVE-2023-5363 (Incorrect cipher key and IV length processing).
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Mon, 23 Oct 2023 19:52:22 +0200
openssl (3.0.11-1~deb12u1) bookworm; urgency=medium
* Import 3.0.11
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Tue, 26 Sep 2023 21:08:42 +0200
openssl (3.0.10-1~deb12u1) bookworm; urgency=medium
* Import 3.0.10
- CVE-2023-2975 (AES-SIV implementation ignores empty associated data
entries) (Closes: #1041818).
- CVE-2023-3446 (Excessive time spent checking DH keys and parameters).
(Closes: #1041817).
- CVE-2023-3817 (Excessive time spent checking DH q parameter value).
-- Sebastian Andrzej Siewior <sebastian@breakpoint.cc> Sat, 26 Aug 2023 11:29:40 +0200
A program compiled against the openssl runtime shared library can use the features in the library libssl3 without having to use or depend on the actual openssl user interface program. That's really common in the Debian ecosystem; in fact it's Deban policy.