Lucene search

K
suseSuseOPENSUSE-SU-2018:3013-1
HistoryOct 05, 2018 - 12:08 p.m.

Security update for openssl-1_1 (moderate)

2018-10-0512:08:41
lists.opensuse.org
77

0.042 Low

EPSS

Percentile

92.3%

This update for openssl-1_1 to 1.1.0i fixes the following issues:

These security issues were fixed:

  • CVE-2018-0732: During key agreement in a TLS handshake using a DH(E)
    based ciphersuite a malicious server could have sent a very large prime
    value to the client. This caused the client to spend an unreasonably
    long period of time generating a key for this prime resulting in a hang
    until the client has finished. This could be exploited in a Denial Of
    Service attack (bsc#1097158)
  • Make problematic ECDSA sign addition length-invariant
  • Add blinding to ECDSA and DSA signatures to protect against side channel
    attacks

These non-security issues were fixed:

  • When unlocking a pass phrase protected PEM file or PKCS#8 container, we
    now allow empty (zero character) pass phrases.
  • Certificate time validation (X509_cmp_time) enforces stricter compliance
    with RFC 5280. Fractional seconds and timezone offsets are no longer
    allowed.
  • Fixed a text canonicalisation bug in CMS
  • Add openssl(cli) Provide so the packages that require the openssl binary
    can require this instead of the new openssl meta package (bsc#1101470)

This update was imported from the SUSE:SLE-15:Update update project.