Debian Security Advisory

DSA-4065-1 openssl1.0 -- security update

Date Reported:
17 Dec 2017
Affected Packages:
openssl1.0
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-3737, CVE-2017-3738.
More information:

Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit. The Common Vulnerabilities and Exposures project identifies the following issues:

  • CVE-2017-3737

    David Benjamin of Google reported that OpenSSL does not properly handle SSL_read() and SSL_write() while being invoked in an error state, causing data to be passed without being decrypted or encrypted directly from the SSL/TLS record layer.

  • CVE-2017-3738

    It was discovered that OpenSSL contains an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli.

Details can be found in the upstream advisory: https://www.openssl.org/news/secadv/20171207.txt

For the stable distribution (stretch), these problems have been fixed in version 1.0.2l-2+deb9u2.

We recommend that you upgrade your openssl1.0 packages.

For the detailed security status of openssl1.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl1.0