MGASA-2014-0165

Source
https://advisories.mageia.org/MGASA-2014-0165.html
Import Source
https://advisories.mageia.org/MGASA-2014-0165.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0165
Related
Published
2014-04-08T07:58:47Z
Modified
2014-04-08T07:58:23Z
Summary
Updated openssl package fix two security vulnerabilities
Details

Updated openssl packages fix security vulnerability:

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).

A missing bounds check in the handling of the TLS heartbeat extension in OpenSSL through 1.0.1f can be used to reveal up to 64k of memory to a connected client or server (CVE-2014-0160).

References
Credits

Affected packages

Mageia:3 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1e-1.5.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1e-8.2.mga4

Ecosystem specific

{
    "section": "core"
}