drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Schwäche in der Verschlüsselung in OpenSSL
Name: |
Schwäche in der Verschlüsselung in OpenSSL |
|
ID: |
MDVSA-2014:067 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva Business Server 1.0 |
|
Datum: |
Mi, 9. April 2014, 10:50 |
|
Referenzen: |
http://advisories.mageia.org/MGASA-2014-0165.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 |
|
Applikationen: |
OpenSSL |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1397029341-21185-0
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2014:067 http://www.mandriva.com/en/support/security/ _______________________________________________________________________
Package : openssl Date : April 9, 2014 Affected: Business Server 1.0 _______________________________________________________________________
Problem Description:
Updated openssl packages fix security vulnerability: The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack (CVE-2014-0076). _______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 http://advisories.mageia.org/MGASA-2014-0165.html _______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64: 6ce72c83600ecc473d840324a95db526 mbs1/x86_64/lib64openssl1.0.0-1.0.0k-1.2.mbs1.x86_64.rpm fc08f87faf41a9e93e220a802627a368 mbs1/x86_64/lib64openssl-devel-1.0.0k-1.2.mbs1.x86_64.rpm 02991647fb80713e63ab6c3471696cbc mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0k-1.2.mbs1.x86_64.rpm b0862093b9546e3aac02adf5c57291a2 mbs1/x86_64/lib64openssl-static-devel-1.0.0k-1.2.mbs1.x86_64.rpm 39d7188917c594dfdea6c5221ca81d26 mbs1/x86_64/openssl-1.0.0k-1.2.mbs1.x86_64.rpm fabaa254030f7f44c0939111e6a49a46 mbs1/SRPMS/openssl-1.0.0k-1.2.mbs1.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFTRM60mqjQ0CJFipgRAsTnAKDIw97M7be4MvVphEqT+jiYRTonZQCfV+WV xnCQEqbXioC+ejp3/iCu8Gg= =TwX9 -----END PGP SIGNATURE-----
------------=_1397029341-21185-0 Content-Type: text/plain; charset="UTF-8"; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://store.mandriva.com _______________________________________________________
------------=_1397029341-21185-0--
|
|
|
|