MGASA-2017-0405

Source
https://advisories.mageia.org/MGASA-2017-0405.html
Import Source
https://advisories.mageia.org/MGASA-2017-0405.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0405
Related
Published
2017-11-08T22:43:48Z
Modified
2017-11-08T22:20:46Z
Summary
Updated openssl packages fix security vulnerabilities
Details

If an X.509 certificate has a malformed IPAddressFamily extension, OpenSSL could do a one-byte buffer overread. The most likely result would be an erroneous display of the certificate in text format (CVE-2017-3735).

There is a carry propagating bug in the x86_64 Montgomery squaring procedure (CVE-2017-3736).

References
Credits

Affected packages

Mageia:5 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2m-1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2m-1.mga6

Ecosystem specific

{
    "section": "core"
}