Описание
Security update for compat-openssl098
This update fixes the following security issues:
- CVE-2015-4000 (boo#931698)
- The Logjam Attack / weakdh.org
- reject connections with DH parameters shorter than 1024 bits
- generates 2048-bit DH parameters by default
- CVE-2015-1788 (boo#934487)
- Malformed ECParameters causes infinite loop
- CVE-2015-1789 (boo#934489)
- Exploitable out-of-bounds read in X509_cmp_time
- CVE-2015-1790 (boo#934491)
- PKCS7 crash with missing EnvelopedContent
- CVE-2015-1792 (boo#934493)
- CMS verify infinite loop with unknown hash function
- CVE-2015-1791 (boo#933911)
- race condition in NewSessionTicket
- CVE-2015-3216 (boo#933898)
- Crash in ssleay_rand_bytes due to locking regression
- modified openssl-1.0.1i-fipslocking.patch
- fix timing side channel in RSA decryption (bnc#929678)
- add ECC ciphersuites to DEFAULT (bnc#879179)
- Disable EXPORT ciphers by default (bnc#931698, comment #3)
Список пакетов
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Module for Legacy 12
Ссылки
- Link for SUSE-SU-2015:1150-1
- E-Mail link for SUSE-SU-2015:1150-1
- SUSE Security Ratings
- SUSE Bug 879179
- SUSE Bug 929678
- SUSE Bug 931698
- SUSE Bug 933898
- SUSE Bug 933911
- SUSE Bug 934487
- SUSE Bug 934489
- SUSE Bug 934491
- SUSE Bug 934493
- SUSE CVE CVE-2015-1788 page
- SUSE CVE CVE-2015-1789 page
- SUSE CVE CVE-2015-1790 page
- SUSE CVE CVE-2015-1791 page
- SUSE CVE CVE-2015-1792 page
- SUSE CVE CVE-2015-3216 page
- SUSE CVE CVE-2015-4000 page
Описание
The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
Затронутые продукты
Ссылки
- CVE-2015-1788
- SUSE Bug 934487
- SUSE Bug 934666
- SUSE Bug 936586
- SUSE Bug 937891
- SUSE Bug 938432
Описание
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
Затронутые продукты
Ссылки
- CVE-2015-1789
- SUSE Bug 934489
- SUSE Bug 934666
- SUSE Bug 936586
- SUSE Bug 937891
- SUSE Bug 938432
- SUSE Bug 951391
Описание
The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
Затронутые продукты
Ссылки
- CVE-2015-1790
- SUSE Bug 934491
- SUSE Bug 934666
- SUSE Bug 936586
- SUSE Bug 938432
Описание
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
Затронутые продукты
Ссылки
- CVE-2015-1791
- SUSE Bug 933911
- SUSE Bug 934666
- SUSE Bug 986238
- SUSE Bug 989464
Описание
The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
Затронутые продукты
Ссылки
- CVE-2015-1792
- SUSE Bug 934493
- SUSE Bug 934666
- SUSE Bug 937891
- SUSE Bug 986238
Описание
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
Затронутые продукты
Ссылки
- CVE-2015-3216
- SUSE Bug 933898
Описание
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
Затронутые продукты
Ссылки
- CVE-2015-4000
- SUSE Bug 1074631
- SUSE Bug 1211968
- SUSE Bug 931600
- SUSE Bug 931698
- SUSE Bug 931723
- SUSE Bug 931845
- SUSE Bug 932026
- SUSE Bug 932483
- SUSE Bug 934789
- SUSE Bug 935033
- SUSE Bug 935540
- SUSE Bug 935979
- SUSE Bug 937202
- SUSE Bug 937766
- SUSE Bug 938248
- SUSE Bug 938432
- SUSE Bug 938895
- SUSE Bug 938905
- SUSE Bug 938906