Security update for OpenSSL

SUSE Security Update: Security update for OpenSSL
Announcement ID: SUSE-SU-2015:1181-1
Rating: important
References: #929678 #931698 #934487 #934489 #934491
Affected Products:
  • SLE CLIENT TOOLS 10 for x86_64
  • SLE CLIENT TOOLS 10 for s390x
  • SLE CLIENT TOOLS 10

  • An update that solves four vulnerabilities and has one errata is now available.

    Description:

    OpenSSL was updated to fix several security issues.

    • CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by rejecting connections with DH parameters shorter than 1024 bits. We now also generate 2048-bit DH parameters by default.
    • CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
    • CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
    • CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent was fixed.
    • fixed a timing side channel in RSA decryption (bnc#929678)

    Additional changes:

    In the default SSL cipher string EXPORT ciphers are now disabled. This will only get active if applications get rebuilt and actually use this string. (bnc#931698)

    Security Issues:

    Package List:

    • SLE CLIENT TOOLS 10 for x86_64 (x86_64):
      • openssl-0.9.8a-18.92.1
      • openssl-32bit-0.9.8a-18.92.1
    • SLE CLIENT TOOLS 10 for s390x (s390x):
      • openssl-0.9.8a-18.92.1
      • openssl-32bit-0.9.8a-18.92.1
    • SLE CLIENT TOOLS 10 (i586):
      • openssl-0.9.8a-18.92.1

    References: