Security update for OpenSSL

SUSE Security Update: Security update for OpenSSL
Announcement ID: SUSE-SU-2015:1181-2
Rating: important
References: #929678 #931698 #934487 #934489 #934491
Affected Products:
  • SUSE Linux Enterprise Server 10 SP4 LTSS

  • An update that solves four vulnerabilities and has one errata is now available.

    Description:

    OpenSSL was updated to fix several security issues.

    • CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by rejecting connections with DH parameters shorter than 1024 bits. We now also generate 2048-bit DH parameters by default.
    • CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
    • CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
    • CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent was fixed.
    • fixed a timing side channel in RSA decryption (bnc#929678)

    Additional changes:

    • In the default SSL cipher string EXPORT ciphers are now disabled. This will only get active if applications get rebuilt and actually use this string. (bnc#931698)

    Security Issues:

    Package List:

    • SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
      • openssl-0.9.8a-18.92.1
      • openssl-devel-0.9.8a-18.92.1
      • openssl-doc-0.9.8a-18.92.1
    • SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
      • openssl-32bit-0.9.8a-18.92.1
      • openssl-devel-32bit-0.9.8a-18.92.1

    References: