Lucene search

K
suseSuseSUSE-SU-2015:1150-1
HistoryJun 26, 2015 - 1:05 p.m.

Security update for compat-openssl098 (important)

2015-06-2613:05:09
lists.opensuse.org
34

EPSS

0.974

Percentile

99.9%

This update fixes the following security issues:

  • CVE-2015-4000 (boo#931698)
    • The Logjam Attack / weakdh.org
    • reject connections with DH parameters shorter than 1024 bits
    • generates 2048-bit DH parameters by default
  • CVE-2015-1788 (boo#934487)
    • Malformed ECParameters causes infinite loop
  • CVE-2015-1789 (boo#934489)
    • Exploitable out-of-bounds read in X509_cmp_time
  • CVE-2015-1790 (boo#934491)
    • PKCS7 crash with missing EnvelopedContent
  • CVE-2015-1792 (boo#934493)
    • CMS verify infinite loop with unknown hash function
  • CVE-2015-1791 (boo#933911)
    • race condition in NewSessionTicket
  • CVE-2015-3216 (boo#933898)
    • Crash in ssleay_rand_bytes due to locking regression
    • modified openssl-1.0.1i-fipslocking.patch
  • fix timing side channel in RSA decryption (bnc#929678)
  • add ECC ciphersuites to DEFAULT (bnc#879179)
  • Disable EXPORT ciphers by default (bnc#931698, comment #3)