Security update for OpenSSL
SUSE Security Update: Security update for OpenSSL
Announcement ID: | SUSE-SU-2015:1182-2 |
Rating: | important |
References: | #879179 #929678 #931698 #933898 #933911 #934487 #934489 #934491 #934493 |
Affected Products: |
An update that solves 7 vulnerabilities and has two fixes is now available.
Description:
OpenSSL 0.9.8k was updated to fix several security issues:
- CVE-2015-4000: The Logjam Attack (weakdh.org) has been addressed by rejecting connections with DH parameters shorter than 1024 bits. 2048-bit DH parameters are now generated by default.
- CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
- CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
- CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent was fixed.
- CVE-2015-1792: A CMS verification infinite loop when using an unknown hash function was fixed.
- CVE-2015-1791: Fixed a race condition in NewSessionTicket creation.
- CVE-2015-3216: Fixed a potential crash in ssleay_rand_bytes due to locking regression.
- Fixed a timing side channel in RSA decryption. (bsc#929678)
Additional changes:
- In the default SSL cipher string EXPORT ciphers are now disabled. This will only get active if applications get rebuilt and actually use this string. (bsc#931698)
- Added the ECC ciphersuites to the DEFAULT cipher class. (bsc#879179)
Security Issues:
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-libopenssl-devel=10781
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-libopenssl-devel=10781
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-libopenssl-devel=10781
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-libopenssl-devel=10781
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
- libopenssl-devel-0.9.8j-0.72.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
- libopenssl0_9_8-0.9.8j-0.72.1
- libopenssl0_9_8-hmac-0.9.8j-0.72.1
- openssl-0.9.8j-0.72.1
- openssl-doc-0.9.8j-0.72.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
- libopenssl0_9_8-32bit-0.9.8j-0.72.1
- libopenssl0_9_8-hmac-32bit-0.9.8j-0.72.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
- libopenssl0_9_8-0.9.8j-0.72.1
- libopenssl0_9_8-hmac-0.9.8j-0.72.1
- openssl-0.9.8j-0.72.1
- openssl-doc-0.9.8j-0.72.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
- libopenssl0_9_8-32bit-0.9.8j-0.72.1
- libopenssl0_9_8-hmac-32bit-0.9.8j-0.72.1
- SUSE Linux Enterprise Server 11 SP3 (ia64):
- libopenssl0_9_8-x86-0.9.8j-0.72.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
- libopenssl0_9_8-0.9.8j-0.72.1
- openssl-0.9.8j-0.72.1
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
- libopenssl0_9_8-32bit-0.9.8j-0.72.1
References:
- https://www.suse.com/security/cve/CVE-2015-1788.html
- https://www.suse.com/security/cve/CVE-2015-1789.html
- https://www.suse.com/security/cve/CVE-2015-1790.html
- https://www.suse.com/security/cve/CVE-2015-1791.html
- https://www.suse.com/security/cve/CVE-2015-1792.html
- https://www.suse.com/security/cve/CVE-2015-3216.html
- https://www.suse.com/security/cve/CVE-2015-4000.html
- https://bugzilla.suse.com/879179
- https://bugzilla.suse.com/929678
- https://bugzilla.suse.com/931698
- https://bugzilla.suse.com/933898
- https://bugzilla.suse.com/933911
- https://bugzilla.suse.com/934487
- https://bugzilla.suse.com/934489
- https://bugzilla.suse.com/934491
- https://bugzilla.suse.com/934493
- https://download.suse.com/patch/finder/?keywords=fcf228a4143edf49a5ca32558bfe9721