SUSE Security Update: Security update for OpenSSL ______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1181-2 Rating: important References: #929678 #931698 #934487 #934489 #934491 Cross-References: CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-4000 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS ______________________________________________________________________________
An update that solves four vulnerabilities and has one errata is now available.
Description:
OpenSSL was updated to fix several security issues.
* CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by rejecting connections with DH parameters shorter than 1024 bits. We now also generate 2048-bit DH parameters by default. * CVE-2015-1788: Malformed ECParameters could cause an infinite loop. * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed. * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent was fixed. * fixed a timing side channel in RSA decryption (bnc#929678)
Additional changes:
* In the default SSL cipher string EXPORT ciphers are now disabled. This will only get active if applications get rebuilt and actually use this string. (bnc#931698)