Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2018:3903-1

Опубликовано: 24 нояб. 2018
Источник: suse-cvrf

Описание

Security update for openssl

This update for openssl fixes the following issues:

Security issues fixed:

  • CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
  • CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
  • Add missing timing side channel patch for DSA signature generation (bsc#1113742).

Non-security issues fixed:

  • Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Список пакетов

openSUSE Leap 42.3
libopenssl-devel-1.0.2j-32.1
libopenssl-devel-32bit-1.0.2j-32.1
libopenssl1_0_0-1.0.2j-32.1
libopenssl1_0_0-32bit-1.0.2j-32.1
libopenssl1_0_0-hmac-1.0.2j-32.1
libopenssl1_0_0-hmac-32bit-1.0.2j-32.1
openssl-1.0.2j-32.1
openssl-cavs-1.0.2j-32.1
openssl-doc-1.0.2j-32.1

Описание

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).


Затронутые продукты
openSUSE Leap 42.3:libopenssl-devel-1.0.2j-32.1
openSUSE Leap 42.3:libopenssl-devel-32bit-1.0.2j-32.1
openSUSE Leap 42.3:libopenssl1_0_0-1.0.2j-32.1
openSUSE Leap 42.3:libopenssl1_0_0-32bit-1.0.2j-32.1

Ссылки

Описание

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.


Затронутые продукты
openSUSE Leap 42.3:libopenssl-devel-1.0.2j-32.1
openSUSE Leap 42.3:libopenssl-devel-32bit-1.0.2j-32.1
openSUSE Leap 42.3:libopenssl1_0_0-1.0.2j-32.1
openSUSE Leap 42.3:libopenssl1_0_0-32bit-1.0.2j-32.1

Ссылки