Low: openssl

2018-04-19T23:00:00
ID ALAS-2018-1000
Type amazon
Reporter Amazon
Modified 2018-04-19T23:00:00

Description

Issue Overview:

RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys:
OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key. (CVE-2018-0737 __)

Affected Packages:

openssl

Issue Correction:
Run yum update openssl to update your system.

New Packages:

i686:  
    openssl-1.0.2k-8.107.amzn1.i686  
    openssl-devel-1.0.2k-8.107.amzn1.i686  
    openssl-debuginfo-1.0.2k-8.107.amzn1.i686  
    openssl-static-1.0.2k-8.107.amzn1.i686  
    openssl-perl-1.0.2k-8.107.amzn1.i686

src:  
    openssl-1.0.2k-8.107.amzn1.src

x86_64:  
    openssl-debuginfo-1.0.2k-8.107.amzn1.x86_64  
    openssl-static-1.0.2k-8.107.amzn1.x86_64  
    openssl-1.0.2k-8.107.amzn1.x86_64  
    openssl-devel-1.0.2k-8.107.amzn1.x86_64  
    openssl-perl-1.0.2k-8.107.amzn1.x86_64