SUSE-SU-2015:1181-2: important: Security update for OpenSSL

sle-security-updates at sle-security-updates at
Fri Jul 3 12:06:27 MDT 2015

   SUSE Security Update: Security update for OpenSSL

Announcement ID:    SUSE-SU-2015:1181-2
Rating:             important
References:         #929678 #931698 #934487 #934489 #934491 
Cross-References:   CVE-2015-1788 CVE-2015-1789 CVE-2015-1790
Affected Products:
                    SUSE Linux Enterprise Server 10 SP4 LTSS

   An update that solves four vulnerabilities and has one
   errata is now available.


   OpenSSL was updated to fix several security issues.

       * CVE-2015-4000: The Logjam Attack ( ) has been addressed
         by rejecting connections with DH parameters shorter than 1024 bits.
         We now also generate 2048-bit DH parameters by default.
       * CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
       * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
       * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
         was fixed.
       * fixed a timing side channel in RSA decryption (bnc#929678)

   Additional changes:

       * In the default SSL cipher string EXPORT ciphers are now disabled.
         This will only get active if applications get rebuilt and actually
         use this string. (bnc#931698)

   Security Issues:

       * CVE-2015-1788
       * CVE-2015-1789
       * CVE-2015-1790
       * CVE-2015-4000

Package List:

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):


   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):



More information about the sle-security-updates mailing list