Описание
Recommended update for openssl
This update of openssl fixes two regressions.
-
A regression was caused by the security fix for CVE-2015-0287, where DSA keys were not correctly loaded from file anymore. (bsc#937492)
-
RSA key generation odd keylengths was entering an endless loop (bsc#937212)
Список пакетов
SUSE Linux Enterprise Desktop 12
libopenssl1_0_0-1.0.1i-27.3.1
libopenssl1_0_0-32bit-1.0.1i-27.3.1
openssl-1.0.1i-27.3.1
SUSE Linux Enterprise Server 12
libopenssl1_0_0-1.0.1i-27.3.1
libopenssl1_0_0-32bit-1.0.1i-27.3.1
libopenssl1_0_0-hmac-1.0.1i-27.3.1
libopenssl1_0_0-hmac-32bit-1.0.1i-27.3.1
openssl-1.0.1i-27.3.1
openssl-doc-1.0.1i-27.3.1
SUSE Linux Enterprise Server for SAP Applications 12
libopenssl1_0_0-1.0.1i-27.3.1
libopenssl1_0_0-32bit-1.0.1i-27.3.1
libopenssl1_0_0-hmac-1.0.1i-27.3.1
libopenssl1_0_0-hmac-32bit-1.0.1i-27.3.1
openssl-1.0.1i-27.3.1
openssl-doc-1.0.1i-27.3.1
SUSE Linux Enterprise Software Development Kit 12
libopenssl-devel-1.0.1i-27.3.1
Ссылки
- Link for SUSE-SU-2015:1410-1
- E-Mail link for SUSE-SU-2015:1410-1
- SUSE Security Ratings
- SUSE Bug 937212
- SUSE Bug 937492
- SUSE CVE CVE-2015-0287 page
Описание
The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
Затронутые продукты
SUSE Linux Enterprise Desktop 12:libopenssl1_0_0-1.0.1i-27.3.1
SUSE Linux Enterprise Desktop 12:libopenssl1_0_0-32bit-1.0.1i-27.3.1
SUSE Linux Enterprise Desktop 12:openssl-1.0.1i-27.3.1
SUSE Linux Enterprise Server 12:libopenssl1_0_0-1.0.1i-27.3.1
Ссылки
- CVE-2015-0287
- SUSE Bug 912014
- SUSE Bug 919648
- SUSE Bug 922499
- SUSE Bug 936586
- SUSE Bug 937891
- SUSE Bug 968888
- SUSE Bug 991722