Package: openssl
Version: 3.4.1-1
Severity: important
Tags: security
X-Debbugs-Cc: debian-powe...@lists.debian.org, zu...@debian.org, Debian 
Security Team <t...@security.debian.org>
User: debian-powe...@lists.debian.org
Usertags: ppc64el

Hello,

The OpenSSL maintainers discovered a timing side channel vulnerability in 
OpenSSL's P-384 implementation when used with ECDSA.  The PPC issue is 
discussed publicly here: https://github.com/openssl/openssl/issues/24253 and 
the generic issue is discussed here: 
https://github.com/openssl/openssl/issues/23860

PR link with fix - https://github.com/openssl/openssl/pull/26709

The last comment says - Merged to the master, 3.5, 3.4, 3.3 and 3.2 branches.

Regards


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.12.17-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_USER
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=ca_ES:ca
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openssl depends on:
ii  libc6       2.41-6
ii  libssl3t64  3.4.1-1

openssl recommends no packages.

Versions of packages openssl suggests:
ii  ca-certificates  20241223

-- no debconf information

Reply via email to