openSUSE Security Update : libressl (openSUSE-2017-561)

low Nessus Plugin ID 100043
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 3.6

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for libressl to version 2.5.1 fixes the following issues :

These security issues were fixed :

- CVE-2016-0702: Prevent side channel attack on modular exponentiation (boo#968050).

- CVE-2016-7056: Avoid a side-channel cache-timing attack that can leak the ECDSA private keys when signing (boo#1019334).

These non-security issues were fixed :

- Detect zero-length encrypted session data early

- Curve25519 Key Exchange support.

- Support for alternate chains for certificate verification.

- Added EVP interface for MD5+SHA1 hashes

- Fixed DTLS client failures when the server sends a certificate request.

- Corrected handling of padding when upgrading an SSLv2 challenge into an SSLv3/TLS connection.

- Allowed protocols and ciphers to be set on a TLS config object in libtls.

For additional changes please refer to the changelog.

Solution

Update the affected libressl packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1019334

https://bugzilla.opensuse.org/show_bug.cgi?id=968050

Plugin Details

Severity: Low

ID: 100043

File Name: openSUSE-2017-561.nasl

Version: 3.4

Type: local

Agent: unix

Published: 5/9/2017

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Low

VPR Score: 3.6

CVSS v2.0

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS v3.0

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libcrypto41, p-cpe:/a:novell:opensuse:libcrypto41-32bit, p-cpe:/a:novell:opensuse:libcrypto41-debuginfo, p-cpe:/a:novell:opensuse:libcrypto41-debuginfo-32bit, p-cpe:/a:novell:opensuse:libressl, p-cpe:/a:novell:opensuse:libressl-debuginfo, p-cpe:/a:novell:opensuse:libressl-debugsource, p-cpe:/a:novell:opensuse:libressl-devel, p-cpe:/a:novell:opensuse:libressl-devel-32bit, p-cpe:/a:novell:opensuse:libssl43, p-cpe:/a:novell:opensuse:libssl43-32bit, p-cpe:/a:novell:opensuse:libssl43-debuginfo, p-cpe:/a:novell:opensuse:libssl43-debuginfo-32bit, p-cpe:/a:novell:opensuse:libtls15, p-cpe:/a:novell:opensuse:libtls15-32bit, p-cpe:/a:novell:opensuse:libtls15-debuginfo, p-cpe:/a:novell:opensuse:libtls15-debuginfo-32bit, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 5/8/2017

Reference Information

CVE: CVE-2016-0702, CVE-2016-7056