Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2015:1182-1: important: Security update for OpenSSL

Recommended Posts

SUSE Security Update: Security update for OpenSSL

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2015:1182-1

Rating: important

References: #879179 #929678 #931698 #933898 #933911 #934487

#934489 #934491 #934493

Cross-References: CVE-2015-1788 CVE-2015-1789 CVE-2015-1790

CVE-2015-1791 CVE-2015-1792 CVE-2015-3216

CVE-2015-4000

Affected Products:

SUSE Studio Onsite 1.3

SUSE Manager 1.7 for SLE 11 SP2

______________________________________________________________________________

 

An update that solves 7 vulnerabilities and has two fixes

is now available.

 

Description:

 

 

OpenSSL 0.9.8k was updated to fix several security issues.

 

* CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed

by rejecting connections with DH parameters shorter than 1024 bits.

We now also generate 2048-bit DH parameters by default.

* CVE-2015-1788: Malformed ECParameters could cause an infinite loop.

* CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.

* CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent

was fixed.

* CVE-2015-1792: A CMS verification infinite loop when using an

unknown hash function was fixed.

* CVE-2015-1791: Fixed a race condition in NewSessionTicket creation.

* CVE-2015-3216: Fixed a potential crash in ssleay_rand_bytes due to

locking regression.

* fixed a timing side channel in RSA decryption (bnc#929678)

 

Additional changes:

 

* In the default SSL cipher string EXPORT ciphers are now disabled.

This will only get active if applications get rebuilt and actually

use this string. (bnc#931698)

* Added the ECC ciphersuites to the DEFAULT cipher class (bnc#879179)

 

Security Issues:

 

* CVE-2015-1788

 

* CVE-2015-1789

 

* CVE-2015-1790

 

* CVE-2015-1791

 

* CVE-2015-1792

 

* CVE-2015-3216

 

* CVE-2015-4000

 

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Studio Onsite 1.3:

 

zypper in -t patch slestso13-libopenssl-devel=10780

 

- SUSE Manager 1.7 for SLE 11 SP2:

 

zypper in -t patch sleman17sp2-libopenssl-devel=10780

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Studio Onsite 1.3 (x86_64):

 

libopenssl-devel-0.9.8j-0.72.1

 

- SUSE Manager 1.7 for SLE 11 SP2 (x86_64):

 

libopenssl0_9_8-0.9.8j-0.72.1

libopenssl0_9_8-32bit-0.9.8j-0.72.1

libopenssl0_9_8-hmac-0.9.8j-0.72.1

libopenssl0_9_8-hmac-32bit-0.9.8j-0.72.1

openssl-0.9.8j-0.72.1

openssl-doc-0.9.8j-0.72.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2015-1788.html

https://www.suse.com/security/cve/CVE-2015-1789.html

https://www.suse.com/security/cve/CVE-2015-1790.html

https://www.suse.com/security/cve/CVE-2015-1791.html

https://www.suse.com/security/cve/CVE-2015-1792.html

https://www.suse.com/security/cve/CVE-2015-3216.html

https://www.suse.com/security/cve/CVE-2015-4000.html

https://bugzilla.suse.com/879179

https://bugzilla.suse.com/929678

https://bugzilla.suse.com/931698

https://bugzilla.suse.com/933898

https://bugzilla.suse.com/933911

https://bugzilla.suse.com/934487

https://bugzilla.suse.com/934489

https://bugzilla.suse.com/934491

https://bugzilla.suse.com/934493

https://download.suse.com/patch/finder/?keywords=5f8d475ae46705d05176f539f9c56674

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×