Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:0605-1

Опубликовано: 03 мар. 2017
Источник: suse-cvrf

Описание

Security update for compat-openssl098

This update for compat-openssl098 fixes the following issues contained in the OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:

  • CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
  • CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
  • degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
  • CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed:

  • fix crash in openssl speed (bsc#1000677)
  • don't attempt session resumption if no ticket is present and session ID length is zero (bsc#984663)

Список пакетов

SUSE Linux Enterprise Desktop 12 SP1
libopenssl0_9_8-0.9.8j-105.1
libopenssl0_9_8-32bit-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP2
libopenssl0_9_8-0.9.8j-105.1
libopenssl0_9_8-32bit-0.9.8j-105.1
SUSE Linux Enterprise Module for Legacy 12
libopenssl0_9_8-0.9.8j-105.1
libopenssl0_9_8-32bit-0.9.8j-105.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
libopenssl0_9_8-0.9.8j-105.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
libopenssl0_9_8-0.9.8j-105.1

Описание

The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1

Ссылки

Описание

A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1

Ссылки

Описание

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1
SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1

Ссылки