SUSE-SU-2015:1185-1: important: Security update for OpenSSL
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Fri Jul 3 08:06:37 MDT 2015
SUSE Security Update: Security update for OpenSSL
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1185-1
Rating: important
References: #929678 #931698 #933911 #934487 #934489 #934491
#934493 #934494
Cross-References: CVE-2014-8176 CVE-2015-1788 CVE-2015-1789
CVE-2015-1790 CVE-2015-1791 CVE-2015-1792
CVE-2015-4000
Affected Products:
SUSE Linux Enterprise Security Module 11 SP3
______________________________________________________________________________
An update that solves 7 vulnerabilities and has one errata
is now available.
Description:
OpenSSL 1.0.1 was updated to fix several security issues:
* CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed
by rejecting connections with DH parameters shorter than 1024 bits.
2048-bit DH parameters are now generated by default.
* CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
* CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
* CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
was fixed.
* CVE-2015-1792: A CMS verification infinite loop when using an
unknown hash function was fixed.
* CVE-2015-1791: Fixed a race condition in NewSessionTicket creation.
* CVE-2014-8176: Fixed an invalid free in DTLS.
* Fixed a timing side channel in RSA decryption. (bsc#929678)
Security Issues:
* CVE-2014-8176
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176>
* CVE-2015-1788
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788>
* CVE-2015-1789
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789>
* CVE-2015-1790
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790>
* CVE-2015-1791
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791>
* CVE-2015-1792
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792>
* CVE-2015-4000
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Security Module 11 SP3:
zypper in -t patch secsp3-libopenssl1-devel=10778
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Security Module 11 SP3 (i586 ia64 ppc64 s390x x86_64):
libopenssl1-devel-1.0.1g-0.30.1
libopenssl1_0_0-1.0.1g-0.30.1
openssl1-1.0.1g-0.30.1
openssl1-doc-1.0.1g-0.30.1
- SUSE Linux Enterprise Security Module 11 SP3 (ppc64 s390x x86_64):
libopenssl1_0_0-32bit-1.0.1g-0.30.1
- SUSE Linux Enterprise Security Module 11 SP3 (ia64):
libopenssl1_0_0-x86-1.0.1g-0.30.1
References:
https://www.suse.com/security/cve/CVE-2014-8176.html
https://www.suse.com/security/cve/CVE-2015-1788.html
https://www.suse.com/security/cve/CVE-2015-1789.html
https://www.suse.com/security/cve/CVE-2015-1790.html
https://www.suse.com/security/cve/CVE-2015-1791.html
https://www.suse.com/security/cve/CVE-2015-1792.html
https://www.suse.com/security/cve/CVE-2015-4000.html
https://bugzilla.suse.com/929678
https://bugzilla.suse.com/931698
https://bugzilla.suse.com/933911
https://bugzilla.suse.com/934487
https://bugzilla.suse.com/934489
https://bugzilla.suse.com/934491
https://bugzilla.suse.com/934493
https://bugzilla.suse.com/934494
https://download.suse.com/patch/finder/?keywords=5afbe87912753d6ca074e9e870b2093c
More information about the sle-updates
mailing list