Hash: SHA512

Package        : openssl
Version        : 1.0.1t-1+deb7u3
CVE ID         : CVE-2017-3735

A security vulnerability was discovered in OpenSSL, the Secure Sockets
Layer toolkit.

CVE-2017-3735

    It was discovered that OpenSSL is prone to a one-byte buffer
    overread while parsing a malformed IPAddressFamily extension in an
    X.509 certificate.

    Details can be found in the upstream advisory:
    https://openssl-library.org/news/secadv/20170828.txt


For Debian 7 "Wheezy", these problems have been fixed in version
1.0.1t-1+deb7u3.

We recommend that you upgrade your openssl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1157-1 openssl security update

November 9, 2017

A security vulnerability was discovered in OpenSSL, the Secure Sockets Layer toolkit

Summary

A security vulnerability was discovered in OpenSSL, the Secure Sockets
Layer toolkit.

CVE-2017-3735

It was discovered that OpenSSL is prone to a one-byte buffer
overread while parsing a malformed IPAddressFamily extension in an
X.509 certificate.

Details can be found in the upstream advisory:
https://openssl-library.org/news/secadv/20170828.txt


For Debian 7 "Wheezy", these problems have been fixed in version
1.0.1t-1+deb7u3.

We recommend that you upgrade your openssl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : openssl
Version : 1.0.1t-1+deb7u3
CVE ID : CVE-2017-3735

Related News