Security update for compat-openssl097g

SUSE Security Update: Security update for compat-openssl097g
Announcement ID: SUSE-SU-2018:2534-1
Rating: moderate
References: #1065363 #1087102 #1097158
Cross-References:CVE-2018-0732 CVE-2018-0739
Affected Products:
  • SUSE Linux Enterprise Server for SAP 11-SP4
  • SUSE Linux Enterprise Debuginfo 11-SP4

An update that solves two vulnerabilities and has one errata is now available.


This update for compat-openssl097g fixes the following issues:

These security issues were fixed:

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E)
based ciphersuite a malicious server could have sent a very large prime
value to the client. This caused the client to spend an unreasonably
long period of time generating a key for this prime resulting in a hang
until the client has finished. This could be exploited in a Denial Of
Service attack (bsc#1097158)
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such
as can be found in PKCS7) could eventually exceed the stack given
malicious input with excessive recursion. This could have resulted in
DoS (bsc#1087102)

This non-security issue was fixed:

- Fixed crash in DES_fcrypt (bsc#1065363)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server for SAP 11-SP4:
    zypper in -t patch slesappsp4-compat-openssl097g-13753=1
  • SUSE Linux Enterprise Debuginfo 11-SP4:
    zypper in -t patch dbgsp4-compat-openssl097g-13753=1

Package List:

  • SUSE Linux Enterprise Server for SAP 11-SP4 (ppc64 x86_64):
    • compat-openssl097g-0.9.7g-
    • compat-openssl097g-32bit-0.9.7g-
  • SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64):
    • compat-openssl097g-debuginfo-0.9.7g-
    • compat-openssl097g-debugsource-0.9.7g-
  • SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64):
    • compat-openssl097g-debuginfo-32bit-0.9.7g-