Univention Bugzilla – Bug 48388
openssl1.0: Multiple issues (4.3)
Last modified: 2019-01-09 13:27:13 CET
New Debian openssl1.0 1.0.2q-1~deb9u1 fixes: This update addresses the following issues: * Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732) * timing side channel attack in the DSA signature algorithm (CVE-2018-0734) * RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737) * Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407)
--- mirror/ftp/4.3/unmaintained/4.3-1/source/openssl1.0_1.0.2l-2+deb9u3.dsc +++ apt/ucs_4.3-0-errata4.3-3/source/openssl1.0_1.0.2q-1~deb9u1.dsc @@ -1,3 +1,13 @@ +1.0.2q-1~deb9u1 [Sun, 16 Dec 2018 21:07:51 +0100] Sebastian Andrzej Siewior <sebastian@breakpoint.cc>: + + * use signing-key.asc and a https links for downloads + * Import 1.0.2q stable release. + - CVE-2018-0737 (Cache timing vulnerability in RSA Key Generation) + - CVE-2018-0732 (Client DoS due to large DH parameter) + - CVE-2018-0734 (Timing vulnerability in DSA signature generation) + - CVE-2018-5407 (Microarchitecture timing vulnerability in ECC scalar + multiplication) + 1.0.2l-2+deb9u3 [Thu, 29 Mar 2018 13:10:14 +0200] Sebastian Andrzej Siewior <sebastian@breakpoint.cc>: * CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could <http://10.200.17.11/4.3-3/#4621447778791780509>
OK: yaml OK: announce_errata OK: patch OK: piuparts [4.3-3] 5d5202684e Bug #48388: openssl1.0 1.0.2q-1~deb9u1 doc/errata/staging/openssl1.0.yaml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+)
<http://errata.software-univention.de/ucs/4.3/394.html>