[Pkg-openssl-devel] Bug#947949: openssl: CVE-2019-1551

Salvatore Bonaccorso carnil at debian.org
Thu Jan 2 15:50:46 GMT 2020


Source: openssl
Version: 1.1.1d-2
Severity: important
Tags: security upstream fixed-upstream

Hi,

Filling for tracking the issue for src:openssl.

CVE-2019-1551[0]:
| There is an overflow bug in the x64_64 Montgomery squaring procedure
| used in exponentiation with 512-bit moduli. No EC algorithms are
| affected. Analysis suggests that attacks against 2-prime RSA1024,
| 3-prime RSA1536, and DSA1024 as a result of this defect would be very
| difficult to perform and are not believed likely. Attacks against
| DH512 are considered just feasible. However, for an attack the target
| would have to re-use the DH512 private key, which is not recommended
| anyway. Also applications directly using the low level API BN_mod_exp
| may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e-
| dev (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u-dev (Affected
| 1.0.2-1.0.2t).


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-1551
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
[1] https://www.openssl.org/news/secadv/20191206.txt

Regards,
Salvatore



More information about the Pkg-openssl-devel mailing list