VYPR

rpm package

suse/openssl-1_1&distro=SUSE Linux Enterprise Module for Basesystem 15

pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015

Vulnerabilities (8)

  • CVE-2019-1551Dec 6, 2019
    affected < 1.1.0i-4.27.1fixed 1.1.0i-4.27.1

    There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult

  • CVE-2019-1563Sep 10, 2019
    affected < 1.1.0i-4.24.1fixed 1.1.0i-4.24.1

    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message th

  • CVE-2019-1547Sep 10, 2019
    affected < 1.1.0i-4.24.1fixed 1.1.0i-4.24.1

    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a g

  • CVE-2019-1543Mar 6, 2019
    affected < 1.1.0i-4.21.1fixed 1.1.0i-4.21.1

    ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 byt

  • CVE-2018-0734Oct 30, 2018
    affected < 1.1.0i-4.15.1fixed 1.1.0i-4.15.1

    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fi

  • CVE-2018-0735Oct 29, 2018
    affected < 1.1.0i-4.15.1fixed 1.1.0i-4.15.1

    The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

  • CVE-2018-0732Jun 12, 2018
    affected < 1.1.0h-4.3.1fixed 1.1.0h-4.3.1

    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client

  • CVE-2018-0737Apr 16, 2018
    affected < 1.1.0i-4.18.1fixed 1.1.0i-4.18.1

    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affec