Mageia 2018-0470: openssl security update
Summary
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
timing side channel attack. An attacker could use variations in the
signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a
(Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed
in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p). (CVE-2018-0734)
Simultaneous Multi-threading (SMT) in processors can enable local usersto exploit software vulnerable to timing attacks via a side-channel
timing attack on 'port contention'. (CVE-2018-5407
References
- https://bugs.mageia.org/show_bug.cgi?id=23870
- https://openssl-library.org/news/secadv/20181030.txt
- https://openssl-library.org/news/secadv/20181112.txt
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407
Resolution
MGASA-2018-0470 - Updated openssl packages fix security vulnerabilities
SRPMS
- 6/core/openssl-1.0.2q-1.mga6