CVE-2014-0016
Publication date 24 March 2014
Last updated 24 July 2024
Ubuntu priority
stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA certificates.
Status
Package | Ubuntu Release | Status |
---|---|---|
stunnel4 | 18.04 LTS bionic |
Fixed 3:5.02-1
|
16.04 LTS xenial |
Fixed 3:5.02-1
|
|
14.04 LTS trusty |
Not affected
|
|