MGASA-2014-0187

Source
https://advisories.mageia.org/MGASA-2014-0187.html
Import Source
https://advisories.mageia.org/MGASA-2014-0187.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0187
Related
Published
2014-04-23T16:04:21Z
Modified
2014-04-23T16:03:35Z
Summary
Updated openssl packages fix CVE-2010-5298
Details

Updated openssl packages fix security vulnerability:

A read buffer can be freed even when it still contains data that is used later on, leading to a use-after-free. Given a race condition in a multi-threaded application it may permit an attacker to inject data from one connection into another or cause denial of service (CVE-2010-5298).

Also fixed in this update is a potential security issue with detection of the "critical" flag for the TSA extended key usage under certain cases.

References
Credits

Affected packages

Mageia:4 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1e-8.4.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / openssl

Package

Name
openssl
Purl
pkg:rpm/mageia/openssl?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1e-1.7.mga3

Ecosystem specific

{
    "section": "core"
}