SUSE Security Update: Security update for OpenSSL
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:1181-2
Rating:             important
References:         #929678 #931698 #934487 #934489 #934491 
Cross-References:   CVE-2015-1788 CVE-2015-1789 CVE-2015-1790
                    CVE-2015-4000
Affected Products:
                    SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________

   An update that solves four vulnerabilities and has one
   errata is now available.

Description:


   OpenSSL was updated to fix several security issues.

       * CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed
         by rejecting connections with DH parameters shorter than 1024 bits.
         We now also generate 2048-bit DH parameters by default.
       * CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
       * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
       * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
         was fixed.
       * fixed a timing side channel in RSA decryption (bnc#929678)

   Additional changes:

       * In the default SSL cipher string EXPORT ciphers are now disabled.
         This will only get active if applications get rebuilt and actually
         use this string. (bnc#931698)

   Security Issues:

       * CVE-2015-1788
         
       * CVE-2015-1789
         
       * CVE-2015-1790
         
       * CVE-2015-4000
         



Package List:

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):

      openssl-0.9.8a-18.92.1
      openssl-devel-0.9.8a-18.92.1
      openssl-doc-0.9.8a-18.92.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):

      openssl-32bit-0.9.8a-18.92.1
      openssl-devel-32bit-0.9.8a-18.92.1


References:

   https://www.suse.com/security/cve/CVE-2015-1788.html
   https://www.suse.com/security/cve/CVE-2015-1789.html
   https://www.suse.com/security/cve/CVE-2015-1790.html
   https://www.suse.com/security/cve/CVE-2015-4000.html
   https://bugzilla.suse.com/929678
   https://bugzilla.suse.com/931698
   https://bugzilla.suse.com/934487
   https://bugzilla.suse.com/934489
   https://bugzilla.suse.com/934491
   https://scc.suse.com:443/patches/

SuSE: 2015:1181-2: important: OpenSSL

July 3, 2015
An update that solves four vulnerabilities and has one An update that solves four vulnerabilities and has one An update that solves four vulnerabilities and has one errata is now a...

Summary

OpenSSL was updated to fix several security issues. * CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by rejecting connections with DH parameters shorter than 1024 bits. We now also generate 2048-bit DH parameters by default. * CVE-2015-1788: Malformed ECParameters could cause an infinite loop. * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed. * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent was fixed. * fixed a timing side channel in RSA decryption (bnc#929678) Additional changes: * In the default SSL cipher string EXPORT ciphers are now disabled. This will only get active if applications get rebuilt and actually use this string. (bnc#931698) Security Issues: * CVE-2015-1788 * CVE-2015-1789 * CVE-2015-1790 * CVE-2015-4000 Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): openssl-0.9.8a-18.92.1 openssl-devel-0.9.8a-18.92.1 openssl-doc-0.9.8a-18.92.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64): openssl-32bit-0.9.8a-18.92.1 openssl-devel-32bit-0.9.8a-18.92.1

References

#929678 #931698 #934487 #934489 #934491

Cross- CVE-2015-1788 CVE-2015-1789 CVE-2015-1790

CVE-2015-4000

Affected Products:

SUSE Linux Enterprise Server 10 SP4 LTSS

https://www.suse.com/security/cve/CVE-2015-1788.html

https://www.suse.com/security/cve/CVE-2015-1789.html

https://www.suse.com/security/cve/CVE-2015-1790.html

https://www.suse.com/security/cve/CVE-2015-4000.html

https://bugzilla.suse.com/929678

https://bugzilla.suse.com/931698

https://bugzilla.suse.com/934487

https://bugzilla.suse.com/934489

https://bugzilla.suse.com/934491

https://scc.suse.com:443/patches/

Severity
Announcement ID: SUSE-SU-2015:1181-2
Rating: important

Related News