File _patchinfo of Package patchinfo.11292

<patchinfo incident="11292">
  <issue tracker="bnc" id="1097624">VUL-1: openssl,openssl1,openssl-1_1,openssl-1_0_2: blinding enhancements for ECDSA</issue>
  <issue tracker="bnc" id="1110018">SLES11sp3 ltss: Customer is asking for verification of CVE-2016-8610 openssl-0.9.8j-0.106.12.1.x86_64</issue>
  <issue tracker="bnc" id="1131291">VUL-0: openssl: elliptic curve bypass issue (VU#871675)</issue>
  <issue tracker="bnc" id="1101470">OpenSSL 1.0 command line interface cannot be installed without removing essential packages</issue>
  <issue tracker="bnc" id="1106197">[FIPS][Build 0365] openQA test fails in openssl_pubkey_rsa and generating RSA private key fail</issue>
  <issue tracker="bnc" id="1104789">VUL-1: openssl,openssl1,openssl-1_1,openssl-1_0_2: side channel attack in exponentation "'One and Done" attack</issue>
  <issue tracker="bnc" id="1113652">VUL-1: CVE-2018-0734: openssl,openssl1,openssl-1_1,openssl-1_0_0,compat-openssl098: Timing vulnerability in DSA signature generation</issue>
  <issue tracker="bnc" id="1098592">VUL-1: openssl,openssl1,openssl-1_1,openssl-1_0_2: blinding enhancements for DSA</issue>
  <issue tracker="bnc" id="1113534">VUL-0: CVE-2018-5407: Hyperthread port content side channel aka "PortSmash"</issue>
  <issue tracker="bnc" id="1097158">VUL-0: CVE-2018-0732: openssl1,openssl,compat-openssl098: Reject excessively large primes in DH key generation.</issue>
  <issue tracker="bnc" id="1089039">VUL-1: CVE-2018-0737: openssl side channel attacks against RSA keygeneration</issue>
  <issue tracker="bnc" id="1127080">VUL-0: CVE-2019-1559: openssl,openssl1,openssl-1_0_0,openssl-1_1,compat-openssl097g,compat-openssl098: 0-byte record padding oracle</issue>
  <issue tracker="bnc" id="1117951">VUL-0: The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations</issue>
  <issue tracker="cve" id="2018-0732"/>
  <issue tracker="cve" id="2018-0734"/>
  <issue tracker="cve" id="2018-0737"/>
  <issue tracker="cve" id="2016-8610"/>
  <issue tracker="cve" id="2018-5407"/>
  <issue tracker="cve" id="2019-1559"/>
  <category>security</category>
  <rating>moderate</rating>
  <packager>pmonrealgonzalez</packager>
  <description>
  
This update for openssl fixes the following issues:

- CVE-2018-0732: Reject excessively large primes in DH key generation (bsc#1097158)
- CVE-2018-0734: Timing vulnerability in DSA signature generation (bsc#1113652)
- CVE-2018-0737: Cache timing vulnerability in RSA Key Generation (bsc#1089039)
- CVE-2018-5407: Elliptic curve scalar multiplication timing attack defenses (fixes "PortSmash") (bsc#1113534)
- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Fix One&amp;Done side-channel attack on RSA (bsc#1104789)
- Reject invalid EC point coordinates (bsc#1131291)
- The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations (bsc#1117951)
- Add missing error string to CVE-2016-8610 fix (bsc#1110018#c9)
- blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)

Non security fixes:

- correct the error detection in the fips patch (bsc#1106197)
- Add openssl(cli) Provide so the packages that require the openssl
  binary can require this instead of the new openssl meta package
  (bsc#1101470)

</description>
  <summary>Security update for openssl</summary>
</patchinfo>
openSUSE Build Service is sponsored by