SUSE-SU-2015:1182-1: important: Security update for OpenSSL

sle-security-updates at sle-security-updates at
Fri Jul 3 06:06:17 MDT 2015

   SUSE Security Update: Security update for OpenSSL

Announcement ID:    SUSE-SU-2015:1182-1
Rating:             important
References:         #879179 #929678 #931698 #933898 #933911 #934487 
                    #934489 #934491 #934493 
Cross-References:   CVE-2015-1788 CVE-2015-1789 CVE-2015-1790
                    CVE-2015-1791 CVE-2015-1792 CVE-2015-3216
Affected Products:
                    SUSE Studio Onsite 1.3
                    SUSE Manager 1.7 for SLE 11 SP2

   An update that solves 7 vulnerabilities and has two fixes
   is now available.


   OpenSSL 0.9.8k was updated to fix several security issues.

       * CVE-2015-4000: The Logjam Attack ( ) has been addressed
         by rejecting connections with DH parameters shorter than 1024 bits.
         We now also generate 2048-bit DH parameters by default.
       * CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
       * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
       * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
         was fixed.
       * CVE-2015-1792: A CMS verification infinite loop when using an
         unknown hash function was fixed.
       * CVE-2015-1791: Fixed a race condition in NewSessionTicket creation.
       * CVE-2015-3216: Fixed a potential crash in ssleay_rand_bytes due to
         locking regression.
       * fixed a timing side channel in RSA decryption (bnc#929678)

   Additional changes:

       * In the default SSL cipher string EXPORT ciphers are now disabled.
         This will only get active if applications get rebuilt and actually
         use this string. (bnc#931698)
       * Added the ECC ciphersuites to the DEFAULT cipher class (bnc#879179)

   Security Issues:

       * CVE-2015-1788
       * CVE-2015-1789
       * CVE-2015-1790
       * CVE-2015-1791
       * CVE-2015-1792
       * CVE-2015-3216
       * CVE-2015-4000

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Studio Onsite 1.3:

      zypper in -t patch slestso13-libopenssl-devel=10780

   - SUSE Manager 1.7 for SLE 11 SP2:

      zypper in -t patch sleman17sp2-libopenssl-devel=10780

   To bring your system up-to-date, use "zypper patch".

Package List:

   - SUSE Studio Onsite 1.3 (x86_64):


   - SUSE Manager 1.7 for SLE 11 SP2 (x86_64):



More information about the sle-security-updates mailing list