Low: openssl

2019-03-25T23:11:00
ID ALAS-2019-1153
Type amazon
Reporter Amazon
Modified 2019-03-25T23:11:00

Description

Issue Overview:

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. (CVE-2018-0734 __)

Affected Packages:

openssl

Issue Correction:
Run yum update openssl to update your system.

New Packages:

i686:  
    openssl-debuginfo-1.0.2k-16.148.amzn1.i686  
    openssl-static-1.0.2k-16.148.amzn1.i686  
    openssl-perl-1.0.2k-16.148.amzn1.i686  
    openssl-devel-1.0.2k-16.148.amzn1.i686  
    openssl-1.0.2k-16.148.amzn1.i686

src:  
    openssl-1.0.2k-16.148.amzn1.src

x86_64:  
    openssl-1.0.2k-16.148.amzn1.x86_64  
    openssl-devel-1.0.2k-16.148.amzn1.x86_64  
    openssl-static-1.0.2k-16.148.amzn1.x86_64  
    openssl-debuginfo-1.0.2k-16.148.amzn1.x86_64  
    openssl-perl-1.0.2k-16.148.amzn1.x86_64