Security update for openssl
Announcement ID: | SUSE-SU-2012:0674-1 |
Rating: | important |
References: | #739719 #742821 #748738 #749210 #749213 #749735 #751946 #758060 #761838 |
Affected Products: |
An update that fixes 10 vulnerabilities is now available.
Description:
This update of openssl fixes the following security issues:
* Denial of Service or crash via CBC mode handling.
(CVE-2012-2333
* Incorrect integer conversions that could result in
memory corruption. (CVE-2012-2110
* Potential memory leak in multithreaded key creation.
* Symmetric crypto errors in PKCS7_decrypt.
* Free headers after use in error message.
* S/MIME verification may erroneously fail.
* Tolerating bad MIME headers in ANS.1 parser.
(CVE-2012-1165
* DTLS DoS Attack. (CVE-2012-0050
* DTLS Plaintext Recovery Attack. (CVE-2011-4108
* Double-free in Policy Checks. (CVE-2011-4109
* Uninitialized SSL 3.0 Padding. (CVE-2011-4576
* SGC Restart DoS Attack. (CVE-2011-4619
Package List:
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
- openssl-0.9.8a-18.45.63.1
- openssl-devel-0.9.8a-18.45.63.1
- openssl-doc-0.9.8a-18.45.63.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
- openssl-32bit-0.9.8a-18.45.63.1
- openssl-devel-32bit-0.9.8a-18.45.63.1