Upstream information
Description
There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | SUSE | |
---|---|---|
Base Score | 2.6 | 2.6 |
Vector | AV:N/AC:H/Au:N/C:N/I:N/A:P | AV:N/AC:H/Au:N/C:N/I:N/A:P |
Access Vector | Network | Network |
Access Complexity | High | High |
Authentication | None | None |
Confidentiality Impact | None | None |
Integrity Impact | None | None |
Availability Impact | Partial | Partial |
National Vulnerability Database | |
---|---|
Base Score | 5.9 |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
Access Vector | Network |
Access Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | High |
CVSSv3 Version | 3 |
Note from the SUSE Security Team
This problem affects only openssl 1.0.2 and newer, older versions did not have the code and are not affected. SUSE Bugzilla entries: 1009528 [RESOLVED / FIXED], 1021641 [RESOLVED / FIXED], 1025354 [RESOLVED / WORKSFORME] SUSE Security Advisories:- SUSE-CU-2019:695-1, published Tue Jan 14 00:06:30 MST 2020
- SUSE-CU-2019:706-1, published Thu Jan 16 09:56:32 MST 2020
- SUSE-CU-2019:708-1, published Thu Jan 16 09:56:51 MST 2020
- SUSE-CU-2019:710-1, published Thu Jan 16 09:57:10 MST 2020
- SUSE-CU-2019:712-1, published Thu Jan 16 09:57:31 MST 2020
- SUSE-CU-2019:714-1, published Thu Jan 16 09:57:50 MST 2020
- SUSE-CU-2019:716-1, published Thu Jan 16 09:58:06 MST 2020
- SUSE-CU-2019:719-1, published Thu Jan 16 09:58:33 MST 2020
- SUSE-CU-2019:721-1, published Thu Jan 16 09:58:53 MST 2020
- SUSE-CU-2019:723-1, published Thu Jan 16 09:59:12 MST 2020
- SUSE-CU-2019:725-1, published Thu Jan 16 09:59:40 MST 2020
- SUSE-CU-2019:727-1, published Thu Jan 16 09:59:57 MST 2020
- SUSE-CU-2019:729-1, published Thu Jan 16 10:00:23 MST 2020
- SUSE-CU-2019:731-1, published Thu Jan 16 10:01:00 MST 2020
- SUSE-CU-2019:733-1, published Thu Jan 16 10:01:25 MST 2020
- SUSE-CU-2019:738-1, published Thu Jan 16 10:02:14 MST 2020
- SUSE-SU-2017:0431-1, published Thu Feb 9 07:10:25 MST 2017
- SUSE-SU-2017:0441-1, published Fri Feb 10 13:07:36 MST 2017
- SUSE-SU-2017:0855-1, published Wed Mar 29 10:13:34 MDT 2017
- SUSE-SU-2017:2701-1, published Wed, 11 Oct 2017 03:08:09 +0200 (CEST)
- TID7016794, published Sa 3. Mär 12:01:59 CET 2018
- TID7021518, published Sa 3. Mär 12:01:00 CET 2018
- openSUSE-SU-2017:0481-1, published Fri, 17 Feb 2017 04:12:38 +0100 (CET)
- openSUSE-SU-2017:0527-1, published Tue, 21 Feb 2017 00:07:16 +0100 (CET)
- openSUSE-SU-2017:0941-1, published Wed, 5 Apr 2017 18:20:15 +0200 (CEST)
- openSUSE-SU-2018:0458-1, published Fri, 16 Feb 2018 12:07:45 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
Container caasp/v4/default-http-backend:beta1 Container caasp/v4/dnsmasq-nanny:2.78 Container caasp/v4/flannel:0.9.1 Container caasp/v4/haproxy:beta1 Container caasp/v4/kubedns:beta1 Container caasp/v4/nginx-ingress-controller:beta1 Container caasp/v4/openldap:beta1 Container caasp/v4/pause:1.0.0 Container caasp/v4/pv-recycler-node:8.25 Container caasp/v4/salt-api:beta1 Container caasp/v4/salt-master:beta1 Container caasp/v4/salt-minion:beta1 Container caasp/v4/sidecar:beta1 Container caasp/v4/velum:4.0.0 |
| |
SUSE Enterprise Storage 4 |
| Patchnames: SUSE-Storage-4-2017-476 |
SUSE Linux Enterprise Desktop 12 SP2 |
| Patchnames: SUSE-SLE-DESKTOP-12-SP2-2017-228 |
SUSE Linux Enterprise Desktop 12 SP3 |
| |
SUSE Linux Enterprise Desktop 12 SP4 |
| |
SUSE Linux Enterprise High Performance Computing 12 SP5 SUSE Linux Enterprise Server 12 SP5 |
| |
SUSE Linux Enterprise Module for Basesystem 15 SP1 |
| |
SUSE Linux Enterprise Module for Basesystem 15 SP2 |
| |
SUSE Linux Enterprise Module for Basesystem 15 |
| |
SUSE Linux Enterprise Module for Containers 12 |
| Patchnames: SUSE-SLE-Module-Containers-12-2018-1762 |
SUSE Linux Enterprise Module for Legacy Software 15 SP1 |
| |
SUSE Linux Enterprise Module for Legacy Software 15 |
| |
SUSE Linux Enterprise Module for Web Scripting 12 |
| Patchnames: SUSE-SLE-Module-Web-Scripting-12-2017-221 SUSE-SLE-Module-Web-Scripting-12-2017-476 |
SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server for SAP Applications 12 SP2 |
| Patchnames: SUSE-SLE-SERVER-12-SP2-2017-228 |
SUSE Linux Enterprise Server 12 SP3 |
| |
SUSE Linux Enterprise Server 12 SP4 |
| |
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 |
| Patchnames: SUSE-SLE-RPI-12-SP2-2017-228 |
SUSE Linux Enterprise Software Development Kit 12 SP2 |
| Patchnames: SUSE-SLE-SDK-12-SP2-2017-228 |
SUSE Linux Enterprise Software Development Kit 12 SP3 |
| |
SUSE Linux Enterprise Software Development Kit 12 SP4 |
| |
SUSE Linux Enterprise Software Development Kit 12 SP5 |
| |
openSUSE Leap 15.0 |
| Patchnames: openSUSE Leap 15.0 GA libopenssl1_0_0 openSUSE Leap 15.0 GA libopenssl1_1 openSUSE Leap 15.0 GA openssl |
openSUSE Leap 42.1 |
| Patchnames: openSUSE-2017-284 |
openSUSE Leap 42.2 |
| Patchnames: openSUSE-2017-256 openSUSE-2017-442 |
openSUSE Leap 42.3 |
| Patchnames: openSUSE Leap 42.3 GA libopenssl-devel openSUSE-2018-168 |
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
Product(s) | Source package | State |
---|---|---|
SUSE Linux Enterprise Desktop 12 SP1 | openssl | Not affected |
SUSE Linux Enterprise Desktop 12 SP2 | openssl | Released |
SUSE Linux Enterprise Module for Containers 12 | sles12sp2-docker-image | Released |
SUSE Linux Enterprise Module for Web and Scripting 12 | nodejs4 | Released |
SUSE Linux Enterprise Module for Web and Scripting 12 | nodejs6 | Released |
SUSE Linux Enterprise Server 11 SP4 | openssl | Not affected |
SUSE Linux Enterprise Server 12 SP1 | openssl | Not affected |
SUSE Linux Enterprise Server 12 SP2 | openssl | Released |
SUSE Linux Enterprise Server for the Raspberry Pi | openssl | Released |
SUSE Linux Enterprise Software Development Kit 11 SP4 | openssl | Not affected |
SUSE Linux Enterprise Software Development Kit 12 | openssl | Released |
SUSE Linux Enterprise Software Development Kit 12 SP1 | openssl | Not affected |
SUSE OpenStack Cloud 7 | nodejs6 | Released |
SUSE OpenStack Cloud Crowbar 8 | nodejs6 | Released |
SUSE OpenStack Cloud Crowbar 9 | nodejs6 | Released |
SUSE Studio Onsite | openssl | Not affected |