Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in openssl
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in openssl
ID: SUSE-SU-2018:3864-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 12-SP1-LTSS
Datum: Do, 22. November 2018, 22:30
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
Applikationen: OpenSSL

Originalnachricht

   SUSE Security Update: Security update for openssl
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:3864-1
Rating: moderate
References: #1101470 #1104789 #1106197 #1110018 #1113534
#1113652
Cross-References: CVE-2016-8610 CVE-2018-0734 CVE-2018-0737
CVE-2018-5407
Affected Products:
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has two
fixes is now available.

Description:

This update for openssl fixes the following issues:

Security issues fixed:

- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation
(bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack
defenses (bsc#1113534).
- CVE-2018-0737: Corrected the current error detection of the current fix
(bsc#1106197).
- CVE-2016-8610: Adjusted current fix and add missing error string
(bsc#1110018).
- Add missing timing side channel patch for DSA signature generation
(bsc#1113742).
- Fixed the "One and Done" side-channel attack on RSA (bsc#1104789).

Non-security issues fixed:

- Added openssl(cli) so that the packages that required the openssl binary
can require this instead of the new openssl meta package (bsc#1101470).


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-2762=1



Package List:

- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

libopenssl1_0_0-1.0.1i-54.20.1
libopenssl1_0_0-debuginfo-1.0.1i-54.20.1
libopenssl1_0_0-hmac-1.0.1i-54.20.1
openssl-1.0.1i-54.20.1
openssl-debuginfo-1.0.1i-54.20.1
openssl-debugsource-1.0.1i-54.20.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (s390x x86_64):

libopenssl1_0_0-32bit-1.0.1i-54.20.1
libopenssl1_0_0-debuginfo-32bit-1.0.1i-54.20.1
libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):

openssl-doc-1.0.1i-54.20.1


References:

https://www.suse.com/security/cve/CVE-2016-8610.html
https://www.suse.com/security/cve/CVE-2018-0734.html
https://www.suse.com/security/cve/CVE-2018-0737.html
https://www.suse.com/security/cve/CVE-2018-5407.html
https://bugzilla.suse.com/1101470
https://bugzilla.suse.com/1104789
https://bugzilla.suse.com/1106197
https://bugzilla.suse.com/1110018
https://bugzilla.suse.com/1113534
https://bugzilla.suse.com/1113652

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung