Описание
Security update for libressl
This update for libressl to version 2.5.1 fixes the following issues:
These security issues were fixed:
- CVE-2016-0702: Prevent side channel attack on modular exponentiation (boo#968050).
- CVE-2016-7056: Avoid a side-channel cache-timing attack that can leak the ECDSA private keys when signing (boo#1019334).
These non-security issues were fixed:
- Detect zero-length encrypted session data early
- Curve25519 Key Exchange support.
- Support for alternate chains for certificate verification.
- Added EVP interface for MD5+SHA1 hashes
- Fixed DTLS client failures when the server sends a certificate request.
- Corrected handling of padding when upgrading an SSLv2 challenge into an SSLv3/TLS connection.
- Allowed protocols and ciphers to be set on a TLS config object in libtls.
For additional changes please refer to the changelog.
Список пакетов
openSUSE Leap 42.2
Ссылки
- E-Mail link for openSUSE-SU-2017:1211-1
- SUSE Security Ratings
Описание
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
Затронутые продукты
Ссылки
- CVE-2016-0702
- SUSE Bug 1007806
- SUSE Bug 968044
- SUSE Bug 968050
- SUSE Bug 971238
- SUSE Bug 990370
Описание
A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
Затронутые продукты
Ссылки
- CVE-2016-7056
- SUSE Bug 1005878
- SUSE Bug 1018910
- SUSE Bug 1019334