Security update for openssl1

SUSE Security Update: Security update for openssl1
Announcement ID: SUSE-SU-2017:2968-1
Rating: important
References: #1027908 #1032261 #1055825 #1056058 #1057660 #1065363 #990592
Affected Products:
  • SUSE Linux Enterprise Server 11-SECURITY

  • An update that solves one vulnerability and has 6 fixes is now available.


    This update for openssl1 fixes the following issues:

    Security issues fixed:

    - CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read
    - adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
    - out of bounds read+crash in DES_fcrypt (bsc#1065363)
    - DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
    - Missing important ciphers in openssl 1.0.1i-47.1 (bsc#990592)

    Bug fixes:

    - support alternate root ca chains (bsc#1032261)
    - Require openssl1, so c_rehash1 is available during %post to hash the
    certificates (bsc#1057660)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11-SECURITY:
      zypper in -t patch secsp3-openssl1-13343=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64):
      • libopenssl1-devel-1.0.1g-
      • libopenssl1_0_0-1.0.1g-
      • openssl1-1.0.1g-
      • openssl1-doc-1.0.1g-
    • SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64):
      • libopenssl1_0_0-32bit-1.0.1g-
    • SUSE Linux Enterprise Server 11-SECURITY (ia64):
      • libopenssl1_0_0-x86-1.0.1g-