Source: openssl Version: 1.1.1d-2 Severity: important Tags: security upstream fixed-upstream
Hi, Filling for tracking the issue for src:openssl. CVE-2019-1551[0]: | There is an overflow bug in the x64_64 Montgomery squaring procedure | used in exponentiation with 512-bit moduli. No EC algorithms are | affected. Analysis suggests that attacks against 2-prime RSA1024, | 3-prime RSA1536, and DSA1024 as a result of this defect would be very | difficult to perform and are not believed likely. Attacks against | DH512 are considered just feasible. However, for an attack the target | would have to re-use the DH512 private key, which is not recommended | anyway. Also applications directly using the low level API BN_mod_exp | may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e- | dev (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u-dev (Affected | 1.0.2-1.0.2t). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-1551 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551 [1] https://www.openssl.org/news/secadv/20191206.txt Regards, Salvatore

