|Category:||SuSE Local Security Checks|
|Title:||SuSE Update for openssl openSUSE-SU-2018:2957-1 (openssl)|
|Summary:||The remote host is missing an update for the 'openssl'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'openssl'
package(s) announced via the referenced advisory.
This update for openssl fixes the following issues:
These security issues were fixed:
- Prevent One& Done side-channel attack on RSA that allowed physically near
attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
vulnerable to a cache timing side channel attack. An attacker with
sufficient access to mount cache timing attacks during the RSA key
generation process could have recovered the private key (bsc#1089039)
These non-security issues were fixed:
- Add openssl(cli) Provide so the packages that require the openssl binary
can require this instead of the new openssl meta package (bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
This update was imported from the SUSE:SLE-12-SP2:Update update project.
To install this openSUSE Security Update use the SUSE recommended
like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-1091=1
openssl on openSUSE Leap 42.3
Please install the updated packages.
Common Vulnerability Exposure (CVE) ID: CVE-2018-0737|
BugTraq ID: 103766
Debian Security Information: DSA-4348 (Google Search)
Debian Security Information: DSA-4355 (Google Search)
RedHat Security Advisories: RHSA-2018:3221
RedHat Security Advisories: RHSA-2018:3505
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.