Debian Security Advisory DSA-4807-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
December 08, 2020 https://www.debian.org/security/faq
Package : openssl
CVE ID : CVE-2020-1971
David Benjamin discovered a flaw in the GENERAL_NAME_cmp() function
which could cause a NULL dereference, resulting in denial of service.
Additional details can be found in the upstream advisory:
https://www.openssl.org/news/secadv/20201208.txt
For the stable distribution (buster), this problem has been fixed in
version 1.1.1d-0+deb10u4.
We recommend that you upgrade your openssl packages.
For the detailed security status of openssl please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/openssl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | armhf | libcrypto1.1-udeb | < 1.1.0l-1~deb9u2 | libcrypto1.1-udeb_1.1.0l-1~deb9u2_armhf.deb |
Debian | 9 | amd64 | libssl1.0-dev | < 1.0.2u-1~deb9u3 | libssl1.0-dev_1.0.2u-1~deb9u3_amd64.deb |
Debian | 9 | arm64 | libcrypto1.0.2-udeb | < 1.0.2u-1~deb9u3 | libcrypto1.0.2-udeb_1.0.2u-1~deb9u3_arm64.deb |
Debian | 10 | mips | libssl1.1 | < 1.1.1d-0+deb10u4 | libssl1.1_1.1.1d-0+deb10u4_mips.deb |
Debian | 9 | armel | libssl-dev | < 1.1.0l-1~deb9u2 | libssl-dev_1.1.0l-1~deb9u2_armel.deb |
Debian | 10 | ppc64el | openssl-dbgsym | < 1.1.1d-0+deb10u4 | openssl-dbgsym_1.1.1d-0+deb10u4_ppc64el.deb |
Debian | 9 | arm64 | libssl1.1-udeb | < 1.1.0l-1~deb9u2 | libssl1.1-udeb_1.1.0l-1~deb9u2_arm64.deb |
Debian | 10 | i386 | libssl-dev | < 1.1.1d-0+deb10u4 | libssl-dev_1.1.1d-0+deb10u4_i386.deb |
Debian | 9 | armel | libssl1.1 | < 1.1.0l-1~deb9u2 | libssl1.1_1.1.0l-1~deb9u2_armel.deb |
Debian | 10 | armhf | libcrypto1.1-udeb | < 1.1.1d-0+deb10u4 | libcrypto1.1-udeb_1.1.1d-0+deb10u4_armhf.deb |