SUSE Security Update: Security update for openssl
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:1290-1
Rating:             important
References:         #889013 #968050 #976942 #976943 #977614 #977615 
                    #977617 
Cross-References:   CVE-2016-0702 CVE-2016-2105 CVE-2016-2106
                    CVE-2016-2108 CVE-2016-2109
Affected Products:
                    SUSE Studio Onsite 1.3
                    SUSE OpenStack Cloud 5
                    SUSE Manager Proxy 2.1
                    SUSE Manager 2.1
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Server 11-SP3-LTSS
                    SUSE Linux Enterprise Server 11-SP2-LTSS
                    SUSE Linux Enterprise Debuginfo 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has two fixes
   is now available.

Description:


   This update for openssl fixes the following issues:

   Security issues fixed:
   - CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
   - CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
   - CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
   - CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
   - CVE-2016-0702: Side channel attack on modular exponentiation
     "CacheBleed" (bsc#968050)

   Bugs fixed:
   - fate#320304: build 32bit devel package
   - bsc#976943: Fix buffer overrun in ASN1_parse
   - bsc#973223: allow weak DH groups, vulnerable to the logjam attack, when
     environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set
   - bsc#889013: Rename README.SuSE to the new spelling


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Studio Onsite 1.3:

      zypper in -t patch slestso13-openssl-12557=1

   - SUSE OpenStack Cloud 5:

      zypper in -t patch sleclo50sp3-openssl-12557=1

   - SUSE Manager Proxy 2.1:

      zypper in -t patch slemap21-openssl-12557=1

   - SUSE Manager 2.1:

      zypper in -t patch sleman21-openssl-12557=1

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-openssl-12557=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-openssl-12557=1

   - SUSE Linux Enterprise Server 11-SP3-LTSS:

      zypper in -t patch slessp3-openssl-12557=1

   - SUSE Linux Enterprise Server 11-SP2-LTSS:

      zypper in -t patch slessp2-openssl-12557=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-openssl-12557=1

   - SUSE Linux Enterprise Debuginfo 11-SP3:

      zypper in -t patch dbgsp3-openssl-12557=1

   - SUSE Linux Enterprise Debuginfo 11-SP2:

      zypper in -t patch dbgsp2-openssl-12557=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Studio Onsite 1.3 (x86_64):

      libopenssl-devel-0.9.8j-0.97.1

   - SUSE OpenStack Cloud 5 (x86_64):

      libopenssl-devel-0.9.8j-0.97.1
      libopenssl0_9_8-0.9.8j-0.97.1
      libopenssl0_9_8-32bit-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1
      openssl-0.9.8j-0.97.1
      openssl-doc-0.9.8j-0.97.1

   - SUSE Manager Proxy 2.1 (x86_64):

      libopenssl-devel-0.9.8j-0.97.1
      libopenssl0_9_8-0.9.8j-0.97.1
      libopenssl0_9_8-32bit-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1
      openssl-0.9.8j-0.97.1
      openssl-doc-0.9.8j-0.97.1

   - SUSE Manager 2.1 (s390x x86_64):

      libopenssl-devel-0.9.8j-0.97.1
      libopenssl0_9_8-0.9.8j-0.97.1
      libopenssl0_9_8-32bit-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1
      openssl-0.9.8j-0.97.1
      openssl-doc-0.9.8j-0.97.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libopenssl-devel-0.9.8j-0.97.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

      libopenssl-devel-32bit-0.9.8j-0.97.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libopenssl0_9_8-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-0.9.8j-0.97.1
      openssl-0.9.8j-0.97.1
      openssl-doc-0.9.8j-0.97.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libopenssl0_9_8-32bit-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      libopenssl0_9_8-x86-0.9.8j-0.97.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

      libopenssl-devel-0.9.8j-0.97.1
      libopenssl0_9_8-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-0.9.8j-0.97.1
      openssl-0.9.8j-0.97.1
      openssl-doc-0.9.8j-0.97.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64):

      libopenssl0_9_8-32bit-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1

   - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):

      libopenssl-devel-0.9.8j-0.97.1
      libopenssl0_9_8-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-0.9.8j-0.97.1
      openssl-0.9.8j-0.97.1
      openssl-doc-0.9.8j-0.97.1

   - SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):

      libopenssl0_9_8-32bit-0.9.8j-0.97.1
      libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      openssl-debuginfo-0.9.8j-0.97.1
      openssl-debugsource-0.9.8j-0.97.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

      openssl-debuginfo-0.9.8j-0.97.1
      openssl-debugsource-0.9.8j-0.97.1

   - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):

      openssl-debuginfo-0.9.8j-0.97.1
      openssl-debugsource-0.9.8j-0.97.1


References:

   https://www.suse.com/security/cve/CVE-2016-0702.html
   https://www.suse.com/security/cve/CVE-2016-2105.html
   https://www.suse.com/security/cve/CVE-2016-2106.html
   https://www.suse.com/security/cve/CVE-2016-2108.html
   https://www.suse.com/security/cve/CVE-2016-2109.html
   https://bugzilla.suse.com/889013
   https://bugzilla.suse.com/968050
   https://bugzilla.suse.com/976942
   https://bugzilla.suse.com/976943
   https://bugzilla.suse.com/977614
   https://bugzilla.suse.com/977615
   https://bugzilla.suse.com/977617

SuSE: 2016:1290-1: important: openssl

May 12, 2016
An update that solves 5 vulnerabilities and has two fixes An update that solves 5 vulnerabilities and has two fixes An update that solves 5 vulnerabilities and has two fixes is now...

Summary

This update for openssl fixes the following issues: Security issues fixed: - CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617) - CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614) - CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615) - CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942) - CVE-2016-0702: Side channel attack on modular exponentiation "CacheBleed" (bsc#968050) Bugs fixed: - fate#320304: build 32bit devel package - bsc#976943: Fix buffer overrun in ASN1_parse - bsc#973223: allow weak DH groups, vulnerable to the logjam attack, when environment variable OPENSSL_ALLOW_LOGJAM_ATTACK is set - bsc#889013: Rename README.SuSE to the new spelling Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-openssl-12557=1 - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-openssl-12557=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-openssl-12557=1 - SUSE Manager 2.1: zypper in -t patch sleman21-openssl-12557=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-openssl-12557=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-openssl-12557=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-openssl-12557=1 - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-openssl-12557=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-openssl-12557=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-openssl-12557=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-openssl-12557=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64): libopenssl-devel-0.9.8j-0.97.1 - SUSE OpenStack Cloud 5 (x86_64): libopenssl-devel-0.9.8j-0.97.1 libopenssl0_9_8-0.9.8j-0.97.1 libopenssl0_9_8-32bit-0.9.8j-0.97.1 libopenssl0_9_8-hmac-0.9.8j-0.97.1 libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 openssl-0.9.8j-0.97.1 openssl-doc-0.9.8j-0.97.1 - SUSE Manager Proxy 2.1 (x86_64): libopenssl-devel-0.9.8j-0.97.1 libopenssl0_9_8-0.9.8j-0.97.1 libopenssl0_9_8-32bit-0.9.8j-0.97.1 libopenssl0_9_8-hmac-0.9.8j-0.97.1 libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 openssl-0.9.8j-0.97.1 openssl-doc-0.9.8j-0.97.1 - SUSE Manager 2.1 (s390x x86_64): libopenssl-devel-0.9.8j-0.97.1 libopenssl0_9_8-0.9.8j-0.97.1 libopenssl0_9_8-32bit-0.9.8j-0.97.1 libopenssl0_9_8-hmac-0.9.8j-0.97.1 libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 openssl-0.9.8j-0.97.1 openssl-doc-0.9.8j-0.97.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libopenssl-devel-0.9.8j-0.97.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libopenssl-devel-32bit-0.9.8j-0.97.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libopenssl0_9_8-0.9.8j-0.97.1 libopenssl0_9_8-hmac-0.9.8j-0.97.1 openssl-0.9.8j-0.97.1 openssl-doc-0.9.8j-0.97.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libopenssl0_9_8-32bit-0.9.8j-0.97.1 libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): libopenssl0_9_8-x86-0.9.8j-0.97.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): libopenssl-devel-0.9.8j-0.97.1 libopenssl0_9_8-0.9.8j-0.97.1 libopenssl0_9_8-hmac-0.9.8j-0.97.1 openssl-0.9.8j-0.97.1 openssl-doc-0.9.8j-0.97.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64): libopenssl0_9_8-32bit-0.9.8j-0.97.1 libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): libopenssl-devel-0.9.8j-0.97.1 libopenssl0_9_8-0.9.8j-0.97.1 libopenssl0_9_8-hmac-0.9.8j-0.97.1 openssl-0.9.8j-0.97.1 openssl-doc-0.9.8j-0.97.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64): libopenssl0_9_8-32bit-0.9.8j-0.97.1 libopenssl0_9_8-hmac-32bit-0.9.8j-0.97.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): openssl-debuginfo-0.9.8j-0.97.1 openssl-debugsource-0.9.8j-0.97.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): openssl-debuginfo-0.9.8j-0.97.1 openssl-debugsource-0.9.8j-0.97.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): openssl-debuginfo-0.9.8j-0.97.1 openssl-debugsource-0.9.8j-0.97.1

References

#889013 #968050 #976942 #976943 #977614 #977615

#977617

Cross- CVE-2016-0702 CVE-2016-2105 CVE-2016-2106

CVE-2016-2108 CVE-2016-2109

Affected Products:

SUSE Studio Onsite 1.3

SUSE OpenStack Cloud 5

SUSE Manager Proxy 2.1

SUSE Manager 2.1

SUSE Linux Enterprise Software Development Kit 11-SP4

SUSE Linux Enterprise Server 11-SP4

SUSE Linux Enterprise Server 11-SP3-LTSS

SUSE Linux Enterprise Server 11-SP2-LTSS

SUSE Linux Enterprise Debuginfo 11-SP4

SUSE Linux Enterprise Debuginfo 11-SP3

SUSE Linux Enterprise Debuginfo 11-SP2

https://www.suse.com/security/cve/CVE-2016-0702.html

https://www.suse.com/security/cve/CVE-2016-2105.html

https://www.suse.com/security/cve/CVE-2016-2106.html

https://www.suse.com/security/cve/CVE-2016-2108.html

https://www.suse.com/security/cve/CVE-2016-2109.html

https://bugzilla.suse.com/889013

https://bugzilla.suse.com/968050

https://bugzilla.suse.com/976942

https://bugzilla.suse.com/976943

https://bugzilla.suse.com/977614

https://bugzilla.suse.com/977615

https://bugzilla.suse.com/977617

Severity
Announcement ID: SUSE-SU-2016:1290-1
Rating: important

Related News