[SECURITY] [DLA 2774-1] openssl1.0 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2774-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Thorsten Alteholz
September 30, 2021 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : openssl1.0
Version : 1.0.2u-1~deb9u6
CVE ID : CVE-2021-3712
An issue has been found in openssl1.0, a Secure Sockets Layer library.
The issue is related to read buffer overruns while processing ASN.1
strings.
For Debian 9 stretch, this problem has been fixed in version
1.0.2u-1~deb9u6.
We recommend that you upgrade your openssl1.0 packages.
For the detailed security status of openssl1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssl1.0
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=FnbS
-----END PGP SIGNATURE-----
Reply to: