{"affected":[{"ecosystem_specific":{"binaries":[{"libopenssl1-devel":"1.0.1g-0.58.12.1","libopenssl1_0_0":"1.0.1g-0.58.12.1","libopenssl1_0_0-32bit":"1.0.1g-0.58.12.1","libopenssl1_0_0-x86":"1.0.1g-0.58.12.1","openssl1":"1.0.1g-0.58.12.1","openssl1-doc":"1.0.1g-0.58.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11-SECURITY","name":"openssl1","purl":"pkg:rpm/suse/openssl1&distro=SUSE%20Linux%20Enterprise%20Server%2011-SECURITY"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.1g-0.58.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openssl1 fixes the following security issues:\n\n- CVE-2018-0737: The RSA Key generation algorithm has been shown to be\n  vulnerable to a cache timing side channel attack. An attacker with sufficient\n  access to mount cache timing attacks during the RSA key generation process\n  could have recovered the private key (bsc#1089039)\n- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based\n  ciphersuite a malicious server could have sent a very large prime value to the\n  client. This caused the client to spend an unreasonably long period of time\n  generating a key for this prime resulting in a hang until the client has\n  finished. This could be exploited in a Denial Of Service attack (bsc#1097158)\n- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)\n","id":"SUSE-SU-2018:2545-1","modified":"2018-08-28T15:32:39Z","published":"2018-08-28T15:32:39Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182545-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1089039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097158"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097624"},{"type":"REPORT","url":"https://bugzilla.suse.com/1098592"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-0732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-0737"}],"related":["CVE-2018-0732","CVE-2018-0737"],"summary":"Security update for openssl1","upstream":["CVE-2018-0732","CVE-2018-0737"]}