openSUSE-SU-2015:2349-1: moderate: Security update for compat-openssl098
openSUSE Security Update: Security update for compat-openssl098 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:2349-1 Rating: moderate References: #952099 #957812 Cross-References: CVE-2015-3195 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for compat-openssl098 fixes the following issues: Security issue fixed: - CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS routines so any application which reads PKCS#7 or CMS data from untrusted sources is affected. SSL/TLS is not affected. (bsc#957812) Non security issue fixed: - Prevent segfault in s_client with invalid options (bsc#952099) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2015-940=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): compat-openssl098-debugsource-0.9.8j-6.1 libopenssl0_9_8-0.9.8j-6.1 libopenssl0_9_8-debuginfo-0.9.8j-6.1 - openSUSE Leap 42.1 (x86_64): libopenssl0_9_8-32bit-0.9.8j-6.1 libopenssl0_9_8-debuginfo-32bit-0.9.8j-6.1 References: https://www.suse.com/security/cve/CVE-2015-3195.html https://bugzilla.suse.com/952099 https://bugzilla.suse.com/957812
participants (1)
-
opensuse-security@opensuse.org