Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.13.2018.325.01
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2018-325-01)
Zusammenfassung:The remote host is missing an update for the 'openssl' package(s) announced via the SSA:2018-325-01 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'openssl' package(s) announced via the SSA:2018-325-01 advisory.

Vulnerability Insight:
New openssl packages are available for Slackware 14.2 and -current to
fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/openssl-1.0.2q-i586-1_slack14.2.txz: Upgraded.
This update fixes a timing side-channel flaw on processors which implement
SMT/Hyper-Threading architectures, and a side channel attack on DSA
signature generation that could allow an attacker to recover the private key.
For more information, see:
[links moved to references]
(* Security fix *)
patches/packages/openssl-solibs-1.0.2q-i586-1_slack14.2.txz: Upgraded.
+--------------------------+

Affected Software/OS:
'openssl' package(s) on Slackware 14.0, Slackware 14.1, Slackware 14.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-0734
BugTraq ID: 105758
http://www.securityfocus.com/bid/105758
Debian Security Information: DSA-4348 (Google Search)
https://www.debian.org/security/2018/dsa-4348
Debian Security Information: DSA-4355 (Google Search)
https://www.debian.org/security/2018/dsa-4355
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
RedHat Security Advisories: RHSA-2019:2304
https://access.redhat.com/errata/RHSA-2019:2304
RedHat Security Advisories: RHSA-2019:3700
https://access.redhat.com/errata/RHSA-2019:3700
RedHat Security Advisories: RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3932
RedHat Security Advisories: RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3933
RedHat Security Advisories: RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:3935
SuSE Security Announcement: openSUSE-SU-2019:1547 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
SuSE Security Announcement: openSUSE-SU-2019:1814 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
https://usn.ubuntu.com/3840-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-5407
BugTraq ID: 105897
http://www.securityfocus.com/bid/105897
https://www.exploit-db.com/exploits/45785/
https://security.gentoo.org/glsa/201903-10
https://eprint.iacr.org/2018/1060.pdf
https://github.com/bbbrumley/portsmash
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html
RedHat Security Advisories: RHSA-2019:0483
https://access.redhat.com/errata/RHSA-2019:0483
RedHat Security Advisories: RHSA-2019:0651
https://access.redhat.com/errata/RHSA-2019:0651
RedHat Security Advisories: RHSA-2019:0652
https://access.redhat.com/errata/RHSA-2019:0652
RedHat Security Advisories: RHSA-2019:2125
https://access.redhat.com/errata/RHSA-2019:2125
RedHat Security Advisories: RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3929
RedHat Security Advisories: RHSA-2019:3931
https://access.redhat.com/errata/RHSA-2019:3931
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.