Security update for OpenSSL
SUSE Security Update: Security update for OpenSSL
Announcement ID: | SUSE-SU-2015:1181-2 |
Rating: | important |
References: | #929678 #931698 #934487 #934489 #934491 |
Affected Products: |
An update that solves four vulnerabilities and has one errata is now available.
Description:
OpenSSL was updated to fix several security issues.
- CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by rejecting connections with DH parameters shorter than 1024 bits. We now also generate 2048-bit DH parameters by default.
- CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
- CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
- CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent was fixed.
- fixed a timing side channel in RSA decryption (bnc#929678)
Additional changes:
- In the default SSL cipher string EXPORT ciphers are now disabled. This will only get active if applications get rebuilt and actually use this string. (bnc#931698)
Security Issues:
Package List:
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
- openssl-0.9.8a-18.92.1
- openssl-devel-0.9.8a-18.92.1
- openssl-doc-0.9.8a-18.92.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
- openssl-32bit-0.9.8a-18.92.1
- openssl-devel-32bit-0.9.8a-18.92.1
References:
- https://www.suse.com/security/cve/CVE-2015-1788.html
- https://www.suse.com/security/cve/CVE-2015-1789.html
- https://www.suse.com/security/cve/CVE-2015-1790.html
- https://www.suse.com/security/cve/CVE-2015-4000.html
- https://bugzilla.suse.com/929678
- https://bugzilla.suse.com/931698
- https://bugzilla.suse.com/934487
- https://bugzilla.suse.com/934489
- https://bugzilla.suse.com/934491
- https://download.suse.com/patch/finder/?keywords=9f7ad0f893ed0c841ceae726daca55cd