SUSE: 2018:2449-1 moderate: openssl
Summary
This update for openssl fixes the following issues: - CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server could have sent a very large prime value to the client. This caused the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack (bsc#1097158). - Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE CaaS Platform 3.0: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: - SUSE CaaS Platform 3.0 (x86_64): libopenssl1_0_0-1.0.2j-60.34.1 libopenssl1_0_0-debuginfo-1.0.2j-60.34.1 openssl-1.0.2j-60.34.1 openssl-debuginfo-1.0.2j-60.34.1 openssl-debugsource-1.0.2j-60.34.1
References
#1097158 #1097624 #1098592
Cross- CVE-2018-0732
Affected Products:
SUSE CaaS Platform 3.0
https://www.suse.com/security/cve/CVE-2018-0732.html
https://bugzilla.suse.com/1097158
https://bugzilla.suse.com/1097624
https://bugzilla.suse.com/1098592