VYPR

rpm package

suse/compat-openssl098&distro=SUSE Linux Enterprise Desktop 12 SP3

pkg:rpm/suse/compat-openssl098&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3

Vulnerabilities (7)

  • CVE-2019-1559Feb 27, 2019
    affected < 0.9.8j-106.12.1fixed 0.9.8j-106.12.1

    If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 by

  • CVE-2018-5407Nov 15, 2018
    affected < 0.9.8j-106.9.1fixed 0.9.8j-106.9.1

    Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

  • CVE-2018-0734Oct 30, 2018
    affected < 0.9.8j-106.9.1fixed 0.9.8j-106.9.1

    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fi

  • CVE-2018-0732Jun 12, 2018
    affected < 0.9.8j-106.6.1fixed 0.9.8j-106.6.1

    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client

  • CVE-2018-0737Apr 16, 2018
    affected < 0.9.8j-106.6.1fixed 0.9.8j-106.6.1

    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affec

  • CVE-2018-0739Mar 27, 2018
    affected < 0.9.8j-106.6.1fixed 0.9.8j-106.6.1

    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from u

  • CVE-2016-8610HigNov 13, 2017
    affected < 0.9.8j-106.9.1fixed 0.9.8j-106.9.1

    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amoun