A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service. Additional details can be found in the upstream advisory: https://www.openssl.org/news/secadv/20210325.txt For the stable distribution (buster), this problem has been fixed in version 1.1.1d-0+deb10u6. We recommend that you upgrade your openssl packages. For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl
A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service.
Additional details can be found in the upstream advisory: https://www.openssl.org/news/secadv/20210325.txt
For the stable distribution (buster), this problem has been fixed in version 1.1.1d-0+deb10u6.
We recommend that you upgrade your openssl packages.
For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl