Security update for compat-openssl098

SUSE Security Update: Security update for compat-openssl098
Announcement ID: SUSE-SU-2014:1512-1
Rating: moderate
References: #901223 #901277
Affected Products:
  • SUSE Linux Enterprise Module for Legacy Software 12
  • SUSE Linux Enterprise Desktop 12

  • An update that fixes three vulnerabilities is now available.

    Description:

    compat-openssl098 was updated to fix three security issues.

    NOTE: this update alone DOESN'T FIX the POODLE SSL protocol vulnerability.
    OpenSSL only adds downgrade detection support for client applications. See
    https://www.suse.com/support/kb/doc.php?id=7015773 for mitigations.

    These security issues were fixed:
    - Session ticket memory leak (CVE-2014-3567).
    - Fixed build option no-ssl3 (CVE-2014-3568).
    - Added support for TLS_FALLBACK_SCSV (CVE-2014-3566).

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Module for Legacy Software 12:
      zypper in -t patch SUSE-SLE-Module-Legacy-12-2014-83
    • SUSE Linux Enterprise Desktop 12:
      zypper in -t patch SUSE-SLE-DESKTOP-12-2014-83

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Module for Legacy Software 12 (s390x x86_64):
      • compat-openssl098-debugsource-0.9.8j-62.1
      • libopenssl0_9_8-0.9.8j-62.1
      • libopenssl0_9_8-debuginfo-0.9.8j-62.1
    • SUSE Linux Enterprise Desktop 12 (x86_64):
      • compat-openssl098-debugsource-0.9.8j-62.1
      • libopenssl0_9_8-0.9.8j-62.1
      • libopenssl0_9_8-debuginfo-0.9.8j-62.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-3566.html
    • http://support.novell.com/security/cve/CVE-2014-3567.html
    • http://support.novell.com/security/cve/CVE-2014-3568.html
    • https://bugzilla.suse.com/show_bug.cgi?id=901223
    • https://bugzilla.suse.com/show_bug.cgi?id=901277