ELA-21-1 openssl security update

cache timing side channel attack

Packageopenssl
Version1.0.1t-1+deb7u6
Related CVE CVE-2018-0737

Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia discovered that the OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key.

For Debian 7 Wheezy, these problems have been fixed in version 1.0.1t-1+deb7u6.

We recommend that you upgrade your openssl packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/