rpm package
opensuse/openssl-1_1&distro=openSUSE Leap 15.0
pkg:rpm/opensuse/openssl-1_1&distro=openSUSE%20Leap%2015.0
Vulnerabilities (4)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-1563 | — | < 1.1.0i-lp150.3.25.1 | 1.1.0i-lp150.3.25.1 | Sep 10, 2019 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message th | ||
| CVE-2019-1547 | — | < 1.1.0i-lp150.3.25.1 | 1.1.0i-lp150.3.25.1 | Sep 10, 2019 | Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a g | ||
| CVE-2019-1543 | — | < 1.1.0i-lp150.3.22.3 | 1.1.0i-lp150.3.22.3 | Mar 6, 2019 | ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 byt | ||
| CVE-2018-0737 | — | < 1.1.0i-lp150.3.18.1 | 1.1.0i-lp150.3.18.1 | Apr 16, 2018 | The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affec |
- CVE-2019-1563Sep 10, 2019affected < 1.1.0i-lp150.3.25.1fixed 1.1.0i-lp150.3.25.1
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message th
- CVE-2019-1547Sep 10, 2019affected < 1.1.0i-lp150.3.25.1fixed 1.1.0i-lp150.3.25.1
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a g
- CVE-2019-1543Mar 6, 2019affected < 1.1.0i-lp150.3.22.3fixed 1.1.0i-lp150.3.22.3
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 byt
- CVE-2018-0737Apr 16, 2018affected < 1.1.0i-lp150.3.18.1fixed 1.1.0i-lp150.3.18.1
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affec