Revision Date: | 2015-06-17 | Version: | 1 |
Title: | Security update for compat-openssl098 (Important) |
Description: |
This update fixes the following security issues:
- CVE-2015-4000 (boo#931698) * The Logjam Attack / weakdh.org * reject connections with DH parameters shorter than 1024 bits * generates 2048-bit DH parameters by default - CVE-2015-1788 (boo#934487) * Malformed ECParameters causes infinite loop - CVE-2015-1789 (boo#934489) * Exploitable out-of-bounds read in X509_cmp_time - CVE-2015-1790 (boo#934491) * PKCS7 crash with missing EnvelopedContent - CVE-2015-1792 (boo#934493) * CMS verify infinite loop with unknown hash function - CVE-2015-1791 (boo#933911) * race condition in NewSessionTicket - CVE-2015-3216 (boo#933898) * Crash in ssleay_rand_bytes due to locking regression * modified openssl-1.0.1i-fipslocking.patch - fix timing side channel in RSA decryption (bnc#929678) - add ECC ciphersuites to DEFAULT (bnc#879179) - Disable EXPORT ciphers by default (bnc#931698, comment #3)
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 879179 929678 931698 933898 933911 934487 934489 934491 934493 CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791 CVE-2015-1792 CVE-2015-3216 CVE-2015-4000 SUSE-SU-2015:1150-1
|
Platform(s): | SUSE Linux Enterprise Desktop 12
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 is installed AND Package Information
libopenssl0_9_8-0.9.8j-78.1 is installed
OR libopenssl0_9_8-32bit-0.9.8j-78.1 is installed
|