Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 605416 - <dev-libs/openssl-1.0.2: ECDSA P-256 timing attack key recovery (CVE-2016-7056)
Summary: <dev-libs/openssl-1.0.2: ECDSA P-256 timing attack key recovery (CVE-2016-7056)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks: CVE-2016-7056
  Show dependency tree
 
Reported: 2017-01-11 21:55 UTC by Thomas Deutschmann (RETIRED)
Modified: 2017-01-11 22:09 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-11 21:55:48 UTC
OpenSSL is vulnerable to an ECDSA P-256 timing attack. Please see the tracker bug 605414 for more details.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-11 22:09:53 UTC
Fixed by: https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008

$ git tag --contains 8aed2a7548362e88e84a7feb795a3a97e8395008 | sort -u
OpenSSL_1_0_2
OpenSSL_1_0_2a
OpenSSL_1_0_2b
OpenSSL_1_0_2-beta3
OpenSSL_1_0_2c
OpenSSL_1_0_2d
OpenSSL_1_0_2e
OpenSSL_1_0_2f
OpenSSL_1_0_2g
OpenSSL_1_0_2h
OpenSSL_1_0_2i
OpenSSL_1_0_2j


Version in repository: 1.0.2j

Repository is clean, nothing left to do.