Security update for openssl1

SUSE Security Update: Security update for openssl1
Announcement ID: SUSE-SU-2014:1357-1
Rating: important
References: #901223 #901277
Affected Products:
  • SUSE Linux Enterprise Security Module 11 SP3

  • An update that fixes four vulnerabilities is now available.

    Description:


    This OpenSSL update fixes the following issues:

    * SRTP Memory Leak (CVE-2014-3513)
    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

    Security Issues:

    * CVE-2014-3513

    * CVE-2014-3567

    * CVE-2014-3566

    * CVE-2014-3568

    Indications:

    Everybody should update.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Security Module 11 SP3:
      zypper in -t patch secsp3-libopenssl1-devel-9904

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Security Module 11 SP3 (i586 ia64 ppc64 s390x x86_64):
      • libopenssl1-devel-1.0.1g-0.22.1
      • libopenssl1_0_0-1.0.1g-0.22.1
      • openssl1-1.0.1g-0.22.1
      • openssl1-doc-1.0.1g-0.22.1
    • SUSE Linux Enterprise Security Module 11 SP3 (ppc64 s390x x86_64):
      • libopenssl1_0_0-32bit-1.0.1g-0.22.1
    • SUSE Linux Enterprise Security Module 11 SP3 (ia64):
      • libopenssl1_0_0-x86-1.0.1g-0.22.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-3513.html
    • http://support.novell.com/security/cve/CVE-2014-3566.html
    • http://support.novell.com/security/cve/CVE-2014-3567.html
    • http://support.novell.com/security/cve/CVE-2014-3568.html
    • https://bugzilla.suse.com/show_bug.cgi?id=901223
    • https://bugzilla.suse.com/show_bug.cgi?id=901277
    • http://download.suse.com/patch/finder/?keywords=b73f6fe02c4bdbb47052a845f36d3df3