Mailinglist Archive: opensuse-security-announce (37 mails)

< Previous Next >
[security-announce] openSUSE-SU-2015:0130-1: important: Security update for openssl
openSUSE Security Update: Security update for openssl
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:0130-1
Rating: important
References: #911399 #912014 #912015 #912018 #912292 #912293
#912294 #912296
Cross-References: CVE-2014-3569 CVE-2014-3570 CVE-2014-3571
CVE-2014-3572 CVE-2014-8275 CVE-2015-0204
CVE-2015-0205 CVE-2015-0206
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________

An update that fixes 8 vulnerabilities is now available.

Description:


openssl was updated to 1.0.1k to fix various security issues and bugs.

More information can be found in the openssl advisory:
http://openssl.org/news/secadv_20150108.txt

Following issues were fixed:

* CVE-2014-3570 (bsc#912296): Bignum squaring (BN_sqr) may have produced
incorrect results on some platforms, including x86_64.

* CVE-2014-3571 (bsc#912294): Fixed crash in dtls1_get_record whilst in
the listen state where you get two separate reads performed - one for
the header and one for the body of the handshake record.

* CVE-2014-3572 (bsc#912015): Don't accept a handshake using an ephemeral
ECDH ciphersuites with the server key exchange message omitted.

* CVE-2014-8275 (bsc#912018): Fixed various certificate fingerprint issues.

* CVE-2015-0204 (bsc#912014): Only allow ephemeral RSA keys in export
ciphersuites

* CVE-2015-0205 (bsc#912293): A fixwas added to prevent use of DH client
certificates without sending certificate verify message.

* CVE-2015-0206 (bsc#912292): A memory leak was fixed in
dtls1_buffer_record.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2015-67

- openSUSE 13.1:

zypper in -t patch openSUSE-2015-67

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

libopenssl-devel-1.0.1k-2.16.2
libopenssl1_0_0-1.0.1k-2.16.2
libopenssl1_0_0-debuginfo-1.0.1k-2.16.2
libopenssl1_0_0-hmac-1.0.1k-2.16.2
openssl-1.0.1k-2.16.2
openssl-debuginfo-1.0.1k-2.16.2
openssl-debugsource-1.0.1k-2.16.2

- openSUSE 13.2 (x86_64):

libopenssl-devel-32bit-1.0.1k-2.16.2
libopenssl1_0_0-32bit-1.0.1k-2.16.2
libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.16.2
libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2

- openSUSE 13.2 (noarch):

openssl-doc-1.0.1k-2.16.2

- openSUSE 13.1 (i586 x86_64):

libopenssl-devel-1.0.1k-11.64.2
libopenssl1_0_0-1.0.1k-11.64.2
libopenssl1_0_0-debuginfo-1.0.1k-11.64.2
openssl-1.0.1k-11.64.2
openssl-debuginfo-1.0.1k-11.64.2
openssl-debugsource-1.0.1k-11.64.2

- openSUSE 13.1 (x86_64):

libopenssl-devel-32bit-1.0.1k-11.64.2
libopenssl1_0_0-32bit-1.0.1k-11.64.2
libopenssl1_0_0-debuginfo-32bit-1.0.1k-11.64.2

- openSUSE 13.1 (noarch):

openssl-doc-1.0.1k-11.64.2


References:

http://support.novell.com/security/cve/CVE-2014-3569.html
http://support.novell.com/security/cve/CVE-2014-3570.html
http://support.novell.com/security/cve/CVE-2014-3571.html
http://support.novell.com/security/cve/CVE-2014-3572.html
http://support.novell.com/security/cve/CVE-2014-8275.html
http://support.novell.com/security/cve/CVE-2015-0204.html
http://support.novell.com/security/cve/CVE-2015-0205.html
http://support.novell.com/security/cve/CVE-2015-0206.html
https://bugzilla.suse.com/show_bug.cgi?id=911399
https://bugzilla.suse.com/show_bug.cgi?id=912014
https://bugzilla.suse.com/show_bug.cgi?id=912015
https://bugzilla.suse.com/show_bug.cgi?id=912018
https://bugzilla.suse.com/show_bug.cgi?id=912292
https://bugzilla.suse.com/show_bug.cgi?id=912293
https://bugzilla.suse.com/show_bug.cgi?id=912294
https://bugzilla.suse.com/show_bug.cgi?id=912296

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages