Bugs fixes in "openssl"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2018-0732 | During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will | 2018-06-26 |
CVE | CVE-2018-0495 | Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of | 2018-06-26 |
CVE | CVE-2018-0732 | During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will | 2018-06-26 |
CVE | CVE-2018-0495 | Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of | 2018-06-26 |
CVE | CVE-2018-0732 | During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will | 2018-06-26 |
CVE | CVE-2018-0495 | Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of | 2018-06-26 |
CVE | CVE-2018-0737 | The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to | 2018-06-26 |
CVE | CVE-2018-0732 | During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will | 2018-06-26 |
CVE | CVE-2018-0495 | Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of | 2018-06-26 |
CVE | CVE-2018-0737 | The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to | 2018-06-26 |
CVE | CVE-2018-0732 | During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will | 2018-06-26 |
CVE | CVE-2018-0495 | Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of | 2018-06-26 |
Launchpad | 1764848 | Upgrade to ca-certificates to 20180409 causes ca-certificates.crt to be removed if duplicate certs found | 2018-04-25 |
Launchpad | 1764848 | Upgrade to ca-certificates to 20180409 causes ca-certificates.crt to be removed if duplicate certs found | 2018-04-25 |
CVE | CVE-2018-0737 | The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to | 2018-04-19 |
CVE | CVE-2018-0737 | The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to | 2018-04-19 |
CVE | CVE-2018-0737 | The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to | 2018-04-19 |
CVE | CVE-2018-0737 | The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to | 2018-04-19 |
CVE | CVE-2018-0739 | Constructed ASN.1 types with a recursive definition (such as can be ... | 2018-03-28 |
CVE | CVE-2018-0739 | Constructed ASN.1 types with a recursive definition (such as can be ... | 2018-03-28 |
About
-
Send Feedback to @ubuntu_updates