SUSE-SU-2018:2545-1: moderate: Security update for openssl1

sle-security-updates at sle-security-updates at
Tue Aug 28 13:10:24 MDT 2018

   SUSE Security Update: Security update for openssl1

Announcement ID:    SUSE-SU-2018:2545-1
Rating:             moderate
References:         #1089039 #1097158 #1097624 #1098592 
Cross-References:   CVE-2018-0732 CVE-2018-0737
Affected Products:
                    SUSE Linux Enterprise Server 11-SECURITY

   An update that solves two vulnerabilities and has two fixes
   is now available.


   This update for openssl1 fixes the following security issues:

   - CVE-2018-0737: The RSA Key generation algorithm has been shown to be
     vulnerable to a cache timing side channel attack. An attacker with
     sufficient access to mount cache timing attacks during the RSA key
     generation process could have recovered the private key (bsc#1089039)
   - CVE-2018-0732: During key agreement in a TLS handshake using a DH(E)
     based ciphersuite a malicious server could have sent a very large prime
     value to the client. This caused the client to spend an unreasonably
     long period of time generating a key for this prime resulting in a hang
     until the client has finished. This could be exploited in a Denial Of
     Service attack (bsc#1097158)
   - Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SECURITY:

      zypper in -t patch secsp3-openssl1-13755=1

Package List:

   - SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64):


   - SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64):


   - SUSE Linux Enterprise Server 11-SECURITY (ia64):



More information about the sle-security-updates mailing list