drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in openssl
Name: |
Mehrere Probleme in openssl |
|
ID: |
DSA-4539-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch, Debian buster |
|
Datum: |
Di, 1. Oktober 2019, 22:47 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549 |
|
Applikationen: |
OpenSSL |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4539-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 01, 2019 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : openssl CVE ID : CVE-2019-1547 CVE-2019-1549 CVE-2019-1563
Three security issues were discovered in OpenSSL: A timing attack against ECDSA, a padding oracle in PKCS7_dataDecode() and CMS_decrypt_set1_pkey() and it was discovered that a feature of the random number generator (RNG) intended to protect against shared RNG state between parent and child processes in the event of a fork() syscall was not used by default.
For the oldstable distribution (stretch), these problems have been fixed in version 1.1.0l-1~deb9u1.
For the stable distribution (buster), these problems have been fixed in version 1.1.1d-0+deb10u1.
We recommend that you upgrade your openssl packages.
For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl2TtFgACgkQEMKTtsN8 TjakOBAAnmXiRjLopoHVkUa9yrzCNBpFYkyxKv/JiVqGQHmSTH35zZrRy6J5UhXo scIRGxxtcAcv0tfWMsF9aFm9W1K/zcnOOZFXRXP3LU5xr/3QSNItP9SxWESzCpC7 pxCVcAPY6P4ZqUMMxjuQ0Q+NRp3xuYRexusu8QSo9v9c0ZhLqlovTpVUaRuaGwKG 4yzNHpt2weh6kdlS4B7GkitPVXfa1NbirHKlJyowpVizM3Y0XyXKw7BJAOJa6vEX ihvOLoufhyLi8tmtq8kKtAVNMzuzSuCWbjesK73ssWhKa6hNGoySf+8g6LmzmjZ9 ML4G2heh+jYAnXQYs6w4GuCCaGwFBii3ViRocqdTqwGgiacdUTorpqosLXNvNGOk HQ9DyVYMZXoEgN+Igxav/rMQmRhLApUYD89hRMVxmnakMGQZop5RlvzsO/sPEjhz +PI1BYIzDxJmUApkQHymrXRa3p/EtDySiDa1Y80+eyb2i23vg8Y68DI6NeNOHltp HhwbLSBTOcBmvWhAxVwqtPH4KlK+Wl7F3UX67xKpiFC/422M3pXKQt2PH+MVeSlt 9wXt46VxzwjTqr6uTd7V5S2+CNhj69PkzyjGfg0rQqhiq7a0nQjPwPI91WAtbgm0 1CCbbFCQaNacmy7Cx6yPJzpoBqyYdS4CjE4gJa4wH7AakiiI0II= =8Ygc -----END PGP SIGNATURE-----
|
|
|
|