Описание
Security update for compat-openssl098
This update for compat-openssl098 fixes the following security issues:
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server could have sent a very large prime value to the client. This caused the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could have resulted in DoS (bsc#1087102).
Список пакетов
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Module for Legacy 12
SUSE Linux Enterprise Server for SAP Applications 12 SP1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP3
Ссылки
- Link for SUSE-SU-2018:2683-1
- E-Mail link for SUSE-SU-2018:2683-1
- SUSE Security Ratings
- SUSE Bug 1087102
- SUSE Bug 1089039
- SUSE Bug 1097158
- SUSE Bug 1097624
- SUSE Bug 1098592
- SUSE CVE CVE-2018-0732 page
- SUSE CVE CVE-2018-0737 page
- SUSE CVE CVE-2018-0739 page
Описание
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Затронутые продукты
Ссылки
- CVE-2018-0732
- SUSE Bug 1077628
- SUSE Bug 1097158
- SUSE Bug 1099502
- SUSE Bug 1106692
- SUSE Bug 1108542
- SUSE Bug 1110163
- SUSE Bug 1112097
- SUSE Bug 1122198
- SUSE Bug 1148697
Описание
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
Затронутые продукты
Ссылки
- CVE-2018-0737
- SUSE Bug 1089039
- SUSE Bug 1089041
- SUSE Bug 1089044
- SUSE Bug 1089045
- SUSE Bug 1108542
- SUSE Bug 1123780
- SUSE Bug 1126909
Описание
Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
Затронутые продукты
Ссылки
- CVE-2018-0739
- SUSE Bug 1087102
- SUSE Bug 1089997
- SUSE Bug 1094291
- SUSE Bug 1108542