logo
DATABASE RESOURCES PRICING ABOUT US

openssl1.0 - security update

Description

David Benjamin discovered a flaw in the GENERAL\_NAME\_cmp() function which could cause a NULL dereference, resulting in denial of service. For Debian 9 stretch, this problem has been fixed in version 1.0.2u-1~deb9u3. We recommend that you upgrade your openssl1.0 packages. For the detailed security status of openssl1.0 please refer to its security tracker page at: <https://security-tracker.debian.org/tracker/openssl1.0> Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: <https://wiki.debian.org/LTS>


Affected Software


CPE Name Name Version
openssl1.0 1.0.2l-2
openssl1.0 1.0.2l-2+deb9u1
openssl1.0 1.0.2l-2+deb9u2
openssl1.0 1.0.2l-2+deb9u3
openssl1.0 1.0.2m-1
openssl1.0 1.0.2m-2
openssl1.0 1.0.2m-3
openssl1.0 1.0.2n-1
openssl1.0 1.0.2n-1+riscv64
openssl1.0 1.0.2o-1
openssl1.0 1.0.2o-1+riscv64
openssl1.0 1.0.2q-1
openssl1.0 1.0.2q-1~deb9u1
openssl1.0 1.0.2q-2
openssl1.0 1.0.2r-1~deb9u1
openssl1.0 1.0.2s-1~deb9u1
openssl1.0 1.0.2t-1~deb9u1
openssl1.0 1.0.2u-1~deb9u1
openssl1.0 1.0.2u-1~deb9u2

Related