aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-08-24 19:42:00 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-08-24 19:42:00 +0200
commit8893b6716ac8e06f1696d121568a974bf244f9c3 (patch)
treed5304a1d2b8a18a2550a00e9cc46ccca15624868
parent0d3a46caac897c81b8d6535d445c5d8da5f0d33e (diff)
[DSA 4963-1] openssl security update
-rw-r--r--english/security/2021/dsa-4963.data13
-rw-r--r--english/security/2021/dsa-4963.wml42
2 files changed, 55 insertions, 0 deletions
diff --git a/english/security/2021/dsa-4963.data b/english/security/2021/dsa-4963.data
new file mode 100644
index 00000000000..6226eac7400
--- /dev/null
+++ b/english/security/2021/dsa-4963.data
@@ -0,0 +1,13 @@
+<define-tag pagetitle>DSA-4963-1 openssl</define-tag>
+<define-tag report_date>2021-8-24</define-tag>
+<define-tag secrefs>CVE-2021-3711 CVE-2021-3712</define-tag>
+<define-tag packages>openssl</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
+
+
+</dl>
diff --git a/english/security/2021/dsa-4963.wml b/english/security/2021/dsa-4963.wml
new file mode 100644
index 00000000000..ef821baa05e
--- /dev/null
+++ b/english/security/2021/dsa-4963.wml
@@ -0,0 +1,42 @@
+<define-tag description>security update</define-tag>
+<define-tag moreinfo>
+<p>Multiple vulnerabilities have been discovered in OpenSSL, a Secure
+Sockets Layer toolkit.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3711">CVE-2021-3711</a>
+
+ <p>John Ouyang reported a buffer overflow vulnerability in the SM2
+ decryption. An attacker able to present SM2 content for
+ decryption to an application can take advantage of this flaw to
+ change application behaviour or cause the application to crash
+ (denial of service).</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3712">CVE-2021-3712</a>
+
+ <p>Ingo Schwarze reported a buffer overrun flaw when processing ASN.1
+ strings in the X509_aux_print() function, which can result in denial
+ of service.</p>
+
+<p>Additional details can be found in the upstream advisory:
+<a href="https://www.openssl.org/news/secadv/20210824.txt">https://www.openssl.org/news/secadv/20210824.txt</a></p></li>
+
+</ul>
+
+<p>For the oldstable distribution (buster), these problems have been fixed
+in version 1.1.1d-0+deb10u7.</p>
+
+<p>For the stable distribution (bullseye), these problems have been fixed in
+version 1.1.1k-1+deb11u1.</p>
+
+<p>We recommend that you upgrade your openssl packages.</p>
+
+<p>For the detailed security status of openssl please refer to its security
+tracker page at:
+<a href="https://security-tracker.debian.org/tracker/openssl">https://security-tracker.debian.org/tracker/openssl</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2021/dsa-4963.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy