SUSE-SU-2018:2534-1

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:2534-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:2534-1
Related
Published
2018-08-28T09:05:06Z
Modified
2018-08-28T09:05:06Z
Summary
Security update for compat-openssl097g
Details

This update for compat-openssl097g fixes the following issues:

These security issues were fixed:

  • CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server could have sent a very large prime value to the client. This caused the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
  • CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could have resulted in DoS (bsc#1087102)

This non-security issue was fixed:

  • Fixed crash in DES_fcrypt (bsc#1065363)
References

Affected packages

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / compat-openssl097g

Package

Name
compat-openssl097g
Purl
purl:rpm/suse/compat-openssl097g&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.7g-146.22.51.5.1

Ecosystem specific

{
    "binaries": [
        {
            "compat-openssl097g": "0.9.7g-146.22.51.5.1",
            "compat-openssl097g-32bit": "0.9.7g-146.22.51.5.1"
        }
    ]
}