Home / vulnerabilitiesPDF  

Mandriva Linux Security Advisory 2014-067

Posted on 10 April 2014
Source : packetstormsecurity.org Link

 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:067
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : openssl
Date : April 9, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Updated openssl packages fix security vulnerability:

The Montgomery ladder implementation in OpenSSL through 1.0.0l does
not ensure that certain swap operations have a constant-time behavior,
which makes it easier for local users to obtain ECDSA nonces via a
FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
http://advisories.mageia.org/MGASA-2014-0165.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
6ce72c83600ecc473d840324a95db526 mbs1/x86_64/lib64openssl1.0.0-1.0.0k-1.2.mbs1.x86_64.rpm
fc08f87faf41a9e93e220a802627a368 mbs1/x86_64/lib64openssl-devel-1.0.0k-1.2.mbs1.x86_64.rpm
02991647fb80713e63ab6c3471696cbc mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0k-1.2.mbs1.x86_64.rpm
b0862093b9546e3aac02adf5c57291a2 mbs1/x86_64/lib64openssl-static-devel-1.0.0k-1.2.mbs1.x86_64.rpm
39d7188917c594dfdea6c5221ca81d26 mbs1/x86_64/openssl-1.0.0k-1.2.mbs1.x86_64.rpm
fabaa254030f7f44c0939111e6a49a46 mbs1/SRPMS/openssl-1.0.0k-1.2.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTRM60mqjQ0CJFipgRAsTnAKDIw97M7be4MvVphEqT+jiYRTonZQCfV+WV
xnCQEqbXioC+ejp3/iCu8Gg=
=TwX9
-----END PGP SIGNATURE-----

 

TOP