A microprocessor side-channel vulnerability was found on SMT (e.g, Hyper-Threading) architectures. An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information. references: https://bugzilla.redhat.com/show_bug.cgi?id=1645695 Gentoo Security Padawan (domhnall)
since the advisory does not mention that, ftr, it is fixed in 1.0.2q
hppa stable
amd64 stable
sparc stable
alpha stable
x86 stable
ia64 stable
ppc64 stable
ppc stable
arm64 stable
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=604a6136f50362e5bcfabf4187ea945e2fdb43f3 commit 604a6136f50362e5bcfabf4187ea945e2fdb43f3 Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2019-01-07 18:44:35 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2019-01-07 18:44:35 +0000 dev-libs/openssl: security cleanup Bug: https://bugs.gentoo.org/673056 Package-Manager: Portage-2.3.54, Repoman-2.3.12 Signed-off-by: Thomas Deutschmann <whissi@gentoo.org> dev-libs/openssl/Manifest | 5 - dev-libs/openssl/openssl-1.0.2p-r1.ebuild | 306 ------------------------------ 2 files changed, 311 deletions(-)
New GLSA request filed.
This issue was resolved and addressed in GLSA 201903-10 at https://security.gentoo.org/glsa/201903-10 by GLSA coordinator Aaron Bauman (b-man).