Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:0112-1

Опубликовано: 16 янв. 2018
Источник: suse-cvrf

Описание

Security update for openssl

This update for openssl fixes the following issues:

Security issues fixed:

  • CVE-2016-7056: ECSDA P-256 timing attack key recovery (bsc#1019334)
  • CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
  • CVE-2016-8610: remote denial of service in SSL alert handling (bsc#1005878)
  • CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)

Bug fixes:

  • support alternate root ca chains (bsc#1032261)
  • X509_get_default_cert_file() returns an incorrect path (bsc#1022271)
  • Segmentation fault in 'openssl speed' when engine library file cannot be found (bsc#1000677)
  • adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
  • Missing important ciphers in openssl 1.0.1i-47.1 on SLES12 SP1 (bsc#990592)
  • out of bounds read+crash in DES_fcrypt (bsc#1065363)
  • tracker bug for January 26th 2017 release (bsc#1021641)
  • patch for CVE-2016-2108 fails negative zero exploit (bsc#1001502)
  • Birthday attacks on 64-bit block ciphers aka triple-des (SWEET32) (bsc#1001912)
  • Include additional patch for CVE-2016-2108 (bsc#1004499)
  • openssl DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)

Список пакетов

SUSE Linux Enterprise Server 12-LTSS
libopenssl1_0_0-1.0.1i-27.28.1
libopenssl1_0_0-32bit-1.0.1i-27.28.1
libopenssl1_0_0-hmac-1.0.1i-27.28.1
libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1
openssl-1.0.1i-27.28.1
openssl-doc-1.0.1i-27.28.1

Описание

The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1

Ссылки

Описание

A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1

Ссылки

Описание

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1

Ссылки

Описание

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1

Ссылки

Описание

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.


Затронутые продукты
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1
SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1

Ссылки
Уязвимость SUSE-SU-2018:0112-1