Количество 49
Количество 49

openSUSE-SU-2018:3015-1
Security update for openssl-1_0_0

SUSE-SU-2018:2965-1
Security update for openssl-1_0_0

SUSE-SU-2018:2545-1
Security update for openssl1
ELSA-2018-4249
ELSA-2018-4249: openssl security update (IMPORTANT)
ELSA-2018-4248
ELSA-2018-4248: openssl security update (IMPORTANT)

openSUSE-SU-2018:2695-1
Security update for compat-openssl098

SUSE-SU-2018:2683-1
Security update for compat-openssl098
ELSA-2018-3221
ELSA-2018-3221: openssl security, bug fix, and enhancement update (MODERATE)

SUSE-SU-2019:1553-1
Security update for openssl

CVE-2018-0737
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVE-2018-0737
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVE-2018-0737
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
CVE-2018-0737
The OpenSSL RSA Key generation algorithm has been shown to be vulnerab ...

CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuit ...

openSUSE-SU-2019:0152-1
Security update for openssl-1_1

openSUSE-SU-2018:2957-1
Security update for openssl

SUSE-SU-2019:0197-1
Security update for openssl-1_1
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | openSUSE-SU-2018:3015-1 Security update for openssl-1_0_0 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2965-1 Security update for openssl-1_0_0 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2545-1 Security update for openssl1 | почти 7 лет назад | ||
ELSA-2018-4249 ELSA-2018-4249: openssl security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2018-4248 ELSA-2018-4248: openssl security update (IMPORTANT) | больше 6 лет назад | |||
![]() | openSUSE-SU-2018:2695-1 Security update for compat-openssl098 | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2683-1 Security update for compat-openssl098 | почти 7 лет назад | ||
ELSA-2018-3221 ELSA-2018-3221: openssl security, bug fix, and enhancement update (MODERATE) | больше 6 лет назад | |||
![]() | SUSE-SU-2019:1553-1 Security update for openssl | около 6 лет назад | ||
![]() | CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | CVSS3: 5.9 | 28% Средний | около 7 лет назад |
![]() | CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | CVSS3: 3.3 | 28% Средний | около 7 лет назад |
![]() | CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | CVSS3: 5.9 | 28% Средний | около 7 лет назад |
CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerab ... | CVSS3: 5.9 | 28% Средний | около 7 лет назад | |
![]() | CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 81% Высокий | около 7 лет назад |
![]() | CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 4.3 | 81% Высокий | около 7 лет назад |
![]() | CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 81% Высокий | около 7 лет назад |
CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuit ... | CVSS3: 7.5 | 81% Высокий | около 7 лет назад | |
![]() | openSUSE-SU-2019:0152-1 Security update for openssl-1_1 | 28% Средний | около 6 лет назад | |
![]() | openSUSE-SU-2018:2957-1 Security update for openssl | 28% Средний | больше 6 лет назад | |
![]() | SUSE-SU-2019:0197-1 Security update for openssl-1_1 | 28% Средний | больше 6 лет назад |
Уязвимостей на страницу