ELA-21-1 openssl security update

cache timing side channel attack

2018-07-22
Packageopenssl
Version1.0.1t-1+deb7u6
Related CVEs CVE-2018-0737


Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia discovered that the OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key.



For Debian 7 Wheezy, these problems have been fixed in version 1.0.1t-1+deb7u6.

We recommend that you upgrade your openssl packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.