Name | CVE-2018-0739 |
Description | Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1330-1, DSA-4157-1, DSA-4158-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libtomcrypt (PTS) | jessie, jessie (lts) | 1.17-6+deb8u1 | vulnerable |
stretch | 1.17-9 | vulnerable | |
buster | 1.18.2-1 | fixed | |
bullseye | 1.18.2-5 | fixed | |
bookworm | 1.18.2-6 | fixed | |
sid, trixie | 1.18.2+dfsg-7 | fixed | |
openssl (PTS) | jessie, jessie (lts) | 1.0.1t-1+deb8u22 | fixed |
stretch (security) | 1.1.0l-1~deb9u6 | fixed | |
stretch (lts), stretch | 1.1.0l-1~deb9u10 | fixed | |
buster, buster (lts) | 1.1.1n-0+deb10u7 | fixed | |
buster (security) | 1.1.1n-0+deb10u6 | fixed | |
bullseye | 1.1.1w-0+deb11u1 | fixed | |
bullseye (security) | 1.1.1w-0+deb11u2 | fixed | |
bookworm | 3.0.15-1~deb12u1 | fixed | |
bookworm (security) | 3.0.14-1~deb12u2 | fixed | |
sid, trixie | 3.3.2-2 | fixed | |
openssl1.0 (PTS) | stretch (security) | 1.0.2u-1~deb9u7 | fixed |
stretch (lts), stretch | 1.0.2u-1~deb9u10 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libtomcrypt | source | (unstable) | 1.18.2-1 | low | ||
openssl | source | wheezy | 1.0.1t-1+deb7u4 | DLA-1330-1 | ||
openssl | source | jessie | 1.0.1t-1+deb8u8 | DSA-4157-1 | ||
openssl | source | stretch | 1.1.0f-3+deb9u2 | DSA-4157-1 | ||
openssl | source | (unstable) | 1.1.0h-1 | |||
openssl1.0 | source | stretch | 1.0.2l-2+deb9u3 | DSA-4158-1 | ||
openssl1.0 | source | (unstable) | 1.0.2o-1 |
[stretch] - libtomcrypt <no-dsa> (Minor issue)
[jessie] - libtomcrypt <no-dsa> (Minor issue)
https://www.openssl.org/news/secadv/20180327.txt
OpenSSL_1_1_0-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33
OpenSSL_1_0_2-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=9310d45087ae546e27e61ddf8f6367f29848220d
https://github.com/libtom/libtomcrypt/pull/373