MGASA-2018-0190

Source
https://advisories.mageia.org/MGASA-2018-0190.html
Import Source
https://advisories.mageia.org/MGASA-2018-0190.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0190
Related
Published
2018-04-03T18:48:20Z
Modified
2018-04-03T18:15:31Z
Summary
Updated openssl packages fix security vulnerability
Details

Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe (CVE-2018-0739).

References
Credits

Affected packages

Mageia:5 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2o-1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2o-1.mga6

Ecosystem specific

{
    "section": "core"
}