Debian Security Advisory
DSA-4065-1 openssl1.0 -- security update
- Date Reported:
- 17 Dec 2017
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-3737, CVE-2017-3738.
- More information:
Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit. The Common Vulnerabilities and Exposures project identifies the following issues:
David Benjamin of Google reported that OpenSSL does not properly handle SSL_read() and SSL_write() while being invoked in an error state, causing data to be passed without being decrypted or encrypted directly from the SSL/TLS record layer.
It was discovered that OpenSSL contains an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli.
Details can be found in the upstream advisory: https://www.openssl.org/news/secadv/20171207.txt
For the stable distribution (stretch), these problems have been fixed in version 1.0.2l-2+deb9u2.
We recommend that you upgrade your openssl1.0 packages.
For the detailed security status of openssl1.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl1.0