Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in OpenSSL
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in OpenSSL
ID: SUSE-SU-2015:1181-1
Distribution: SUSE
Plattformen: SUSE SLE CLIENT TOOLS 10, SUSE SLE CLIENT TOOLS 10 for s390x, SUSE SLE CLIENT TOOLS 10 for x86_64
Datum: Fr, 3. Juli 2015, 23:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
Applikationen: OpenSSL

Originalnachricht

   SUSE Security Update: Security update for OpenSSL
______________________________________________________________________________

Announcement ID: SUSE-SU-2015:1181-1
Rating: important
References: #929678 #931698 #934487 #934489 #934491
Cross-References: CVE-2015-1788 CVE-2015-1789 CVE-2015-1790
CVE-2015-4000
Affected Products:
SLE CLIENT TOOLS 10 for x86_64
SLE CLIENT TOOLS 10 for s390x
SLE CLIENT TOOLS 10
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:


OpenSSL was updated to fix several security issues.

* CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed
by rejecting connections with DH parameters shorter than 1024 bits.
We now also generate 2048-bit DH parameters by default.
* CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
* CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
* CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
was fixed.
* fixed a timing side channel in RSA decryption (bnc#929678)

Additional changes:

In the default SSL cipher string EXPORT ciphers are now disabled. This will
only get active if applications get rebuilt and actually use this string.
(bnc#931698)

Security Issues:

* CVE-2015-1788
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788>
* CVE-2015-1789
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789>
* CVE-2015-1790
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790>
* CVE-2015-4000
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000>



Package List:

- SLE CLIENT TOOLS 10 for x86_64 (x86_64):

openssl-0.9.8a-18.92.1
openssl-32bit-0.9.8a-18.92.1

- SLE CLIENT TOOLS 10 for s390x (s390x):

openssl-0.9.8a-18.92.1
openssl-32bit-0.9.8a-18.92.1

- SLE CLIENT TOOLS 10 (i586):

openssl-0.9.8a-18.92.1


References:

https://www.suse.com/security/cve/CVE-2015-1788.html
https://www.suse.com/security/cve/CVE-2015-1789.html
https://www.suse.com/security/cve/CVE-2015-1790.html
https://www.suse.com/security/cve/CVE-2015-4000.html
https://bugzilla.suse.com/929678
https://bugzilla.suse.com/931698
https://bugzilla.suse.com/934487
https://bugzilla.suse.com/934489
https://bugzilla.suse.com/934491
https://download.suse.com/patch/finder/?keywords=4a7ecd7eeea5e8090f179934ad1b1b02

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung