Описание
Security update for socat
This update for socat fixed the following issues:
- bsc#964844: Fixed security advisory 8, Stack overflow in parser, http://www.openwall.com/lists/oss-security/2016/02/01/5.
- bsc#938913: Improved resilience against Logjam attacks (CVE-2015-4000) by increasing the size of the default DH group from 512 to 2048 bit. This change avoids the non-prime 1024 bit DH p parameter in OpenSSL http://www.dest-unreach.org/socat/contrib/socat-secadv7.html.
Список пакетов
SUSE Linux Enterprise Desktop 12
socat-1.7.2.4-3.1
SUSE Linux Enterprise Desktop 12 SP1
socat-1.7.2.4-3.1
SUSE Linux Enterprise Server 12
socat-1.7.2.4-3.1
SUSE Linux Enterprise Server 12 SP1
socat-1.7.2.4-3.1
SUSE Linux Enterprise Server for SAP Applications 12
socat-1.7.2.4-3.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
socat-1.7.2.4-3.1
Ссылки
- Link for SUSE-SU-2016:0344-1
- E-Mail link for SUSE-SU-2016:0344-1
- SUSE Security Ratings
- SUSE Bug 938913
- SUSE Bug 964844
- SUSE CVE CVE-2015-4000 page
Описание
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:socat-1.7.2.4-3.1
SUSE Linux Enterprise Desktop 12:socat-1.7.2.4-3.1
SUSE Linux Enterprise Server 12 SP1:socat-1.7.2.4-3.1
SUSE Linux Enterprise Server 12:socat-1.7.2.4-3.1
Ссылки
- CVE-2015-4000
- SUSE Bug 1074631
- SUSE Bug 1211968
- SUSE Bug 931600
- SUSE Bug 931698
- SUSE Bug 931723
- SUSE Bug 931845
- SUSE Bug 932026
- SUSE Bug 932483
- SUSE Bug 934789
- SUSE Bug 935033
- SUSE Bug 935540
- SUSE Bug 935979
- SUSE Bug 937202
- SUSE Bug 937766
- SUSE Bug 938248
- SUSE Bug 938432
- SUSE Bug 938895
- SUSE Bug 938905
- SUSE Bug 938906