Mandriva: 2014:067: openssl
Posted by Benjamin D. Thomas   
Mandrake Updated openssl packages fix security vulnerability: The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:067
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : openssl
 Date    : April 9, 2014
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated openssl packages fix security vulnerability:
 
 The Montgomery ladder implementation in OpenSSL through 1.0.0l does
 not ensure that certain swap operations have a constant-time behavior,
 which makes it easier for local users to obtain ECDSA nonces via a
 FLUSH+RELOAD cache side-channel attack (CVE-2014-0076).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
 http://advisories.mageia.org/MGASA-2014-0165.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 6ce72c83600ecc473d840324a95db526  mbs1/x86_64/lib64openssl1.0.0-1.0.0k-1.2.mbs1.x86_64.rpm
 fc08f87faf41a9e93e220a802627a368  mbs1/x86_64/lib64openssl-devel-1.0.0k-1.2.mbs1.x86_64.rpm
 02991647fb80713e63ab6c3471696cbc  mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0k-1.2.mbs1.x86_64.rpm
 b0862093b9546e3aac02adf5c57291a2  mbs1/x86_64/lib64openssl-static-devel-1.0.0k-1.2.mbs1.x86_64.rpm
 39d7188917c594dfdea6c5221ca81d26  mbs1/x86_64/openssl-1.0.0k-1.2.mbs1.x86_64.rpm 
 fabaa254030f7f44c0939111e6a49a46  mbs1/SRPMS/openssl-1.0.0k-1.2.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________