OpenSSL 1.0.2p Notes: https://www.openssl.org/news/openssl-1.0.2-notes.html Major changes between OpenSSL 1.0.2o and OpenSSL 1.0.2p: * Client DoS due to large DH parameter (CVE-2018-0732) * Cache timing vulnerability in RSA Key Generation (CVE-2018-0737) ABI compatible: https://abi-laboratory.pro/index.php?view=objects_report&l=openssl&v1=1.0.2o&v2=1.0.2p
OpenSSH: fix CVE-2018-15473 (username enumeration) Fix from OpenSSH 7.8p1 (https://www.openssh.com/releasenotes.html): ``` * sshd(8): add some countermeasures against timing attacks used for account validation/enumeration. sshd will enforce a minimum time or each failed authentication attempt consisting of a global 5ms minimum plus an additional per-user 0-4ms delay derived from a host secret. ``` Debian patch: https://sources.debian.org/patches/openssh/1:7.4p1-10+deb9u4/upstream-delay-bailout-for-invalid-authenticating-user.patch/