Security update for compat-openssl098
SUSE Security Update: Security update for compat-openssl098
NOTE: this update alone DOESN'T FIX the POODLE SSL protocol vulnerability.
OpenSSL only adds downgrade detection support for client applications. See
https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations.
These security issues were fixed:
- Session ticket memory leak (CVE-2014-3567).
- Fixed build option no-ssl3 (CVE-2014-3568).
- Added support for TLS_FALLBACK_SCSV (CVE-2014-3566).
Announcement ID: | SUSE-SU-2014:1512-1 |
Rating: | moderate |
References: | #901223 #901277 |
Affected Products: |
An update that fixes three vulnerabilities is now available.
Description:
compat-openssl098 was updated to fix three security issues.NOTE: this update alone DOESN'T FIX the POODLE SSL protocol vulnerability.
OpenSSL only adds downgrade detection support for client applications. See
https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations.
These security issues were fixed:
- Session ticket memory leak (CVE-2014-3567).
- Fixed build option no-ssl3 (CVE-2014-3568).
- Added support for TLS_FALLBACK_SCSV (CVE-2014-3566).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Legacy Software 12:
zypper in -t patch SUSE-SLE-Module-Legacy-12-2014-83
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2014-83
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Module for Legacy Software 12 (s390x x86_64):
- compat-openssl098-debugsource-0.9.8j-62.1
- libopenssl0_9_8-0.9.8j-62.1
- libopenssl0_9_8-debuginfo-0.9.8j-62.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
- compat-openssl098-debugsource-0.9.8j-62.1
- libopenssl0_9_8-0.9.8j-62.1
- libopenssl0_9_8-debuginfo-0.9.8j-62.1
References:
- http://support.novell.com/security/cve/CVE-2014-3566.html
- http://support.novell.com/security/cve/CVE-2014-3567.html
- http://support.novell.com/security/cve/CVE-2014-3568.html
- https://bugzilla.suse.com/show_bug.cgi?id=901223
- https://bugzilla.suse.com/show_bug.cgi?id=901277