MGASA-2020-0023

Source
https://advisories.mageia.org/MGASA-2020-0023.html
Import Source
https://advisories.mageia.org/MGASA-2020-0023.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0023
Related
Published
2020-01-05T15:37:51Z
Modified
2020-01-05T15:14:58Z
Summary
Updated openssl packages fix security vulnerability
Details

Updated compat-openssl10 and openssl packages fix security vulnerability:

There is an overflow bug in the x6464 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BNmodexp may be affected if they use BNFLG_CONSTTIME (CVE-2019-1551).

References
Credits

Affected packages

Mageia:7 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0l-1.1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / compat-openssl10

Package

Name
compat-openssl10
Purl
pkg:rpm/mageia/compat-openssl10?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2u-1.mga7

Ecosystem specific

{
    "section": "core"
}