The branch master has been updated
       via  54c39f92bbaae5b32b84c8b632c4daf2d7ad6132 (commit)
       via  c84f2126b736207c23b1984cbc07d496c22ca85d (commit)
      from  43a3ec6622d22e8fb33324d50bd4aa4944e9e5fb (commit)


- Log -----------------------------------------------------------------
commit 54c39f92bbaae5b32b84c8b632c4daf2d7ad6132
Merge: c84f212 43a3ec6
Author: Pauli <paul.d...@oracle.com>
Date:   Tue Oct 30 07:00:24 2018 +1000

    Merge branch 'master' of git.openssl.org:openssl-web

commit c84f2126b736207c23b1984cbc07d496c22ca85d
Author: Pauli <paul.d...@oracle.com>
Date:   Tue Oct 30 07:00:08 2018 +1000

    Add CVE-2018-0734

-----------------------------------------------------------------------

Summary of changes:
 news/newsflash.txt       |  3 ++-
 news/secadv/20181030.pdf | 32 +++++++++++++++++++++++++++++
 news/vulnerabilities.xml | 52 +++++++++++++++++++++++++++++++++++++++++++++++-
 3 files changed, 85 insertions(+), 2 deletions(-)
 create mode 100644 news/secadv/20181030.pdf

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 311c39b..2c05c1a 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,7 +4,8 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
-29-Oct-2018: <a href="/news/secadv/20181029.txt">Security Advisory</a>: one 
low severity fix
+29-Oct-2018: <a href="/news/secadv/20181030.txt">Security Advisory</a>: one 
low severity fix in DSA
+29-Oct-2018: <a href="/news/secadv/20181029.txt">Security Advisory</a>: one 
low severity fix in ECDSA
 11-Sep-2018: Final version of OpenSSL 1.1.1 (LTS) is now available: please 
download and upgrade!
 21-Aug-2018: Beta 7 of OpenSSL 1.1.1 (pre release 9) is now available: please 
download and test it
 14-Aug-2018: OpenSSL 1.1.0i is now available, including bug and security fixes
diff --git a/news/secadv/20181030.pdf b/news/secadv/20181030.pdf
new file mode 100644
index 0000000..b33ac41
--- /dev/null
+++ b/news/secadv/20181030.pdf
@@ -0,0 +1,32 @@
+OpenSSL Security Advisory [30 October 2018]
+===========================================
+
+Timing vulnerability in DSA signature generation (CVE-2018-0734)
+================================================================
+
+Severity: Low
+
+The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
+timing side channel attack. An attacker could use variations in the signing
+algorithm to recover the private key.
+
+Due to the low severity of this issue we are not issuing a new release
+of OpenSSL 1.1.1, 1.1.0 or 1.0.2 at this time. The fix will be included
+in OpenSSL 1.1.1a, OpenSSL 1.1.0j and OpenSSL 1.0.2q when they become
+available. The fix is also available in commit 8abfe72e8c (for 1.1.1),
+ef11e19d13 (for 1.1.0) and commit 43e6a58d49 (for 1.0.2) in the OpenSSL
+git repository.
+
+This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
+
+References
+==========
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20181030.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 52cc185..97ec427 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,57 @@
 
 <!-- The updated attribute should be the same as the first public issue,
      unless an old entry was updated. -->
-<security updated="20181029">
+<security updated="20181030">
+  <issue public="20181030">
+    <impact severity="Low"/>
+    <cve name="2018-0734"/>
+    <affects base="1.1.1" version="1.1.1"/>
+    <affects base="1.1.0" version="1.1.0"/>
+    <affects base="1.1.0" version="1.1.0a"/>
+    <affects base="1.1.0" version="1.1.0b"/>
+    <affects base="1.1.0" version="1.1.0c"/>
+    <affects base="1.1.0" version="1.1.0d"/>
+    <affects base="1.1.0" version="1.1.0e"/>
+    <affects base="1.1.0" version="1.1.0f"/>
+    <affects base="1.1.0" version="1.1.0g"/>
+    <affects base="1.1.0" version="1.1.0h"/>
+    <affects base="1.1.0" version="1.1.0i"/>
+    <affects base="1.0.2" version="1.0.2"/>
+    <affects base="1.0.2" version="1.0.2a"/>
+    <affects base="1.0.2" version="1.0.2b"/>
+    <affects base="1.0.2" version="1.0.2c"/>
+    <affects base="1.0.2" version="1.0.2d"/>
+    <affects base="1.0.2" version="1.0.2e"/>
+    <affects base="1.0.2" version="1.0.2f"/>
+    <affects base="1.0.2" version="1.0.2g"/>
+    <affects base="1.0.2" version="1.0.2h"/>
+    <affects base="1.0.2" version="1.0.2i"/>
+    <affects base="1.0.2" version="1.0.2j"/>
+    <affects base="1.0.2" version="1.0.2k"/>
+    <affects base="1.0.2" version="1.0.2l"/>
+    <affects base="1.0.2" version="1.0.2m"/>
+    <affects base="1.0.2" version="1.0.2n"/>
+    <affects base="1.0.2" version="1.0.2o"/>
+    <affects base="1.0.2" version="1.0.2p"/>
+    <fixed base="1.1.1" version="1.1.1a-dev" date="20181029">
+      <git hash="8abfe72e8c1de1b95f50aa0d9134803b4d00070f"/>
+    </fixed>
+    <fixed base="1.1.0" version="1.1.0j-dev" date="20181029">
+      <git hash="ef11e19d1365eea2b1851e6f540a0bf365d303e7"/>
+    </fixed>
+    <fixed base="1.0.2" version="1.0.2q-dev" date="20181030">
+      <git hash="43e6a58d4991a451daf4891ff05a48735df871ac"/>
+    </fixed>
+    <problemtype>Constant time issue</problemtype>
+    <title>Timing attack against DSA</title>
+    <description>
+      The OpenSSL DSA signature algorithm has been shown to be vulnerable
+      to a timing side channel attack. An attacker could use variations
+      in the signing algorithm to recover the private key.
+    </description>
+    <advisory url="/news/secadv/20181030.txt"/>
+    <reported source="Samuel Weiser"/>
+  </issue>
   <issue public="20181029">
     <impact severity="Low"/>
     <cve name="2018-0735"/>
_____
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits

Reply via email to