First published: Tue Oct 30 2018(Updated: )
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.<br>Security Fix(es):<br><li> openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)</li> <li> openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)</li> <li> openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739)</li> <li> openssl: Malformed X.509 IPAdressFamily could cause OOB read (CVE-2017-3735)</li> <li> openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-debuginfo | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-debuginfo | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-devel | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-devel | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-libs | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-libs | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-perl | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-static | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-static | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-perl | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-debuginfo | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-devel | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-libs | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-perl | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl-static | <1.0.2k-16.el7 | 1.0.2k-16.el7 |
redhat/openssl | <1.0.2k-16.el7.aa | 1.0.2k-16.el7.aa |
redhat/openssl-debuginfo | <1.0.2k-16.el7.aa | 1.0.2k-16.el7.aa |
redhat/openssl-devel | <1.0.2k-16.el7.aa | 1.0.2k-16.el7.aa |
redhat/openssl-libs | <1.0.2k-16.el7.aa | 1.0.2k-16.el7.aa |
redhat/openssl-perl | <1.0.2k-16.el7.aa | 1.0.2k-16.el7.aa |
redhat/openssl-static | <1.0.2k-16.el7.aa | 1.0.2k-16.el7.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2018:3221 is classified as important.
To fix RHSA-2018:3221, you need to upgrade your OpenSSL package to version 1.0.2k-16.el7 or later.
RHSA-2018:3221 affects systems running OpenSSL prior to version 1.0.2k-16.el7.
RHSA-2018:3221 addresses a key extraction side channel vulnerability in multiple crypto libraries.
Yes, it is recommended to restart your system after applying the fix for RHSA-2018:3221 to ensure all services utilize the updated OpenSSL.