Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:1267-1

Опубликовано: 09 мая 2016
Источник: suse-cvrf

Описание

Security update for compat-openssl098

This update for compat-openssl098 fixes the following issues:

  • CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)
  • CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)
  • CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)
  • CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)
  • CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)
  • bsc#976943: Buffer overrun in ASN1_parse

The following non-security bugs were fixed:

  • bsc#889013: Rename README.SuSE to the new spelling (bsc#889013)

Список пакетов

SUSE Linux Enterprise Desktop 12
libopenssl0_9_8-0.9.8j-97.1
libopenssl0_9_8-32bit-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12 SP1
libopenssl0_9_8-0.9.8j-97.1
libopenssl0_9_8-32bit-0.9.8j-97.1
SUSE Linux Enterprise Module for Legacy 12
libopenssl0_9_8-0.9.8j-97.1
libopenssl0_9_8-32bit-0.9.8j-97.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
libopenssl0_9_8-0.9.8j-97.1

Описание

The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-32bit-0.9.8j-97.1

Ссылки

Описание

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-32bit-0.9.8j-97.1

Ссылки

Описание

Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-32bit-0.9.8j-97.1

Ссылки

Описание

The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-32bit-0.9.8j-97.1

Ссылки

Описание

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-0.9.8j-97.1
SUSE Linux Enterprise Desktop 12:libopenssl0_9_8-32bit-0.9.8j-97.1

Ссылки
Уязвимость SUSE-SU-2016:1267-1