Updated openssl packages fix security vulnerabilities
Publication date: 02 Sep 2018Modification date: 02 Sep 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-0732 , CVE-2018-0737
Description
Updated openssl packages fix security vulnerabilities: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack (CVE-2018-0732). The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key (CVE-2018-0737).
References
- https://bugs.mageia.org/show_bug.cgi?id=22934
- https://www.openssl.org/news/secadv/20180416.txt
- https://openwall.com/lists/oss-security/2018/04/16/3
- https://usn.ubuntu.com/3692-1/
- https://usn.ubuntu.com/3628-1/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737
SRPMS
6/core
- openssl-1.0.2p-1.mga6