Mailinglist Archive: opensuse-security-announce (22 mails)
< Previous | Next > |
[security-announce] SUSE-SU-2014:1387-1: important: Security update for OpenSSL
- From: opensuse-security@xxxxxxxxxxxx
- Date: Tue, 11 Nov 2014 01:04:46 +0100 (CET)
- Message-id: <20141111000446.C0AD532260@maintenance.suse.de>
SUSE Security Update: Security update for OpenSSL
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1387-1
Rating: important
References: #901223 #901277
Cross-References: CVE-2014-3566 CVE-2014-3567 CVE-2014-3568
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This OpenSSL update fixes the following issues:
* Session Ticket Memory Leak (CVE-2014-3567)
* Build option no-ssl3 is incomplete ((CVE-2014-3568)
* Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)
Security Issues:
* CVE-2014-3567
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567>
* CVE-2014-3566
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566>
* CVE-2014-3568
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>
Indications:
Everybody should update.
Package List:
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
openssl-0.9.8a-18.86.3
openssl-devel-0.9.8a-18.86.3
openssl-doc-0.9.8a-18.86.3
- SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
openssl-32bit-0.9.8a-18.86.3
openssl-devel-32bit-0.9.8a-18.86.3
References:
http://support.novell.com/security/cve/CVE-2014-3566.html
http://support.novell.com/security/cve/CVE-2014-3567.html
http://support.novell.com/security/cve/CVE-2014-3568.html
https://bugzilla.suse.com/show_bug.cgi?id=901223
https://bugzilla.suse.com/show_bug.cgi?id=901277
http://download.suse.com/patch/finder/?keywords=1960c50f351e883d9bffe5194436ac38
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1387-1
Rating: important
References: #901223 #901277
Cross-References: CVE-2014-3566 CVE-2014-3567 CVE-2014-3568
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This OpenSSL update fixes the following issues:
* Session Ticket Memory Leak (CVE-2014-3567)
* Build option no-ssl3 is incomplete ((CVE-2014-3568)
* Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)
Security Issues:
* CVE-2014-3567
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567>
* CVE-2014-3566
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566>
* CVE-2014-3568
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>
Indications:
Everybody should update.
Package List:
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
openssl-0.9.8a-18.86.3
openssl-devel-0.9.8a-18.86.3
openssl-doc-0.9.8a-18.86.3
- SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
openssl-32bit-0.9.8a-18.86.3
openssl-devel-32bit-0.9.8a-18.86.3
References:
http://support.novell.com/security/cve/CVE-2014-3566.html
http://support.novell.com/security/cve/CVE-2014-3567.html
http://support.novell.com/security/cve/CVE-2014-3568.html
https://bugzilla.suse.com/show_bug.cgi?id=901223
https://bugzilla.suse.com/show_bug.cgi?id=901277
http://download.suse.com/patch/finder/?keywords=1960c50f351e883d9bffe5194436ac38
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx
< Previous | Next > |