{"id":"MGASA-2017-0042","summary":"Updated openssl packages fix security vulnerability","details":"There is a carry propagation bug in the Broadwell-specific Montgomery\nmultiplication procedure that handles input lengths divisible by, but\nlonger than 256 bits. mong EC algorithms only Brainpool P-512 curves are\naffected and one presumably can attack ECDH key negotiation\n(CVE-2016-7055).\n\nIf an SSL/TLS server or client is running on a 32-bit host, and a specific\ncipher is being used, then a truncated packet can cause that server or\nclient to perform an out-of-bounds read, usually resulting in a crash. The\ncrash can be triggered when using RC4-MD5, if it has not been disabled\n(CVE-2017-3731).\n\nThere is a carry propagating bug in the x86_64 Montgomery squaring\nprocedure. An attacker would need online access to an unpatched system\nusing the target private key in a scenario with persistent DH parameters\nand a private key that is shared between multiple clients (CVE-2017-3732).\n","modified":"2026-01-31T06:53:36.482674Z","published":"2017-02-05T20:42:41Z","related":["CVE-2016-7055","CVE-2017-3731","CVE-2017-3732"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0042.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=20188"},{"type":"REPORT","url":"https://www.openssl.org/news/secadv/20170126.txt"}],"affected":[{"package":{"name":"openssl","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/openssl?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.2k-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0042.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}