[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA-1157-1] openssl security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : openssl
Version        : 1.0.1t-1+deb7u3
CVE ID         : CVE-2017-3735

A security vulnerability was discovered in OpenSSL, the Secure Sockets
Layer toolkit.

CVE-2017-3735

    It was discovered that OpenSSL is prone to a one-byte buffer
    overread while parsing a malformed IPAddressFamily extension in an
    X.509 certificate.

    Details can be found in the upstream advisory:
    https://www.openssl.org/news/secadv/20170828.txt


For Debian 7 "Wheezy", these problems have been fixed in version
1.0.1t-1+deb7u3.

We recommend that you upgrade your openssl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=STCk
-----END PGP SIGNATURE-----


Reply to: