-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2952-1 [email protected] https://www.debian.org/lts/security/ Emilio Pozuelo Monfort March 17, 2022 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : openssl Version : 1.1.0l-1~deb9u5 CVE ID : CVE-2019-1551 CVE-2022-0778 Tavis Ormandy discovered that the BN_mod_sqrt() function of OpenSSL could be tricked into an infinite loop. This could result in denial of service via malformed certificates. In addition, this update fixes an overflow bug in the x64_64 Montgomery squaring procedure. For Debian 9 stretch, these problems have been fixed in version 1.1.0l-1~deb9u5. We recommend that you upgrade your openssl packages. For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAmIzA+EACgkQnUbEiOQ2 gwJxtRAAvzwNRu9ycK2xyyNNTGGp7bmeGYfaPJn/NltSMazpuy7WLqIW4XeBxS9S Ws7/rxjEF3c4NAWK+x9bcyu8byAEceDBU2pi2hN/+ae9CukdjQ8RCdwHsww0gxf+ CZwAioIeEOqKz6iqO6s76RlEXNT8dZTeqy0WlnM+n3xZASWHmzwln0LxxkKrJjOl 3RnvBfhkre1u+jGNTfFH3PMtMXsYgS+6FGzENbS/Si/rMppsuM1gqZpiomYfWvCO eYC3FX+H3X81iLOhrtgb5WKuteBgQPKBzg7b69id0IQ32hq3m4TjtGKD+BwJO933 7SXxRFl37vx72isfbrz2P6rQ7b7qh27fLiVfNLEKm/4G6IXF++0qk37e4rL4m0/L VcFw28IFroHB+o6WiSOgltcf6s7lMCSqS6RqtOu4GCKaKA8qvSAd6yZJKu7w2uBw xzq749kmVA16kesnXKzJ0NklG/Mj/ehbl9P8Y4djJ5Dh82sXBdVdfgixHFIml/WX yg92DVYHDNJZ4ZHggPVQgeX7EFd1pg3UMdUJa32r/cF3qIc0g2VmtAui3wnq7O9K SPe/a5emQIdfXg7tL3Gbkgx3naErIeWRrQI2w1WEoRKv3mqUndI12ODnSEF8GXot fIkw7pqg77rf12VPbARrCoXuLV8AFDitr5Sdbra30DLi1+mkJD8= =hHw8 -----END PGP SIGNATURE-----
