Security update for OpenSSL (important)

ID SUSE-SU-2015:1181-1
Type suse
Reporter Suse
Modified 2015-07-03T14:05:21


OpenSSL was updated to fix several security issues.

   * CVE-2015-4000: The Logjam Attack ( ) has been addressed
     by rejecting connections with DH parameters shorter than 1024 bits.
     We now also generate 2048-bit DH parameters by default.
   * CVE-2015-1788: Malformed ECParameters could cause an infinite loop.
   * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
   * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
     was fixed.
   * fixed a timing side channel in RSA decryption (bnc#929678)

Additional changes:

In the default SSL cipher string EXPORT ciphers are now disabled. This will only get active if applications get rebuilt and actually use this string. (bnc#931698)

Security Issues:

   * CVE-2015-1788
     <<a  rel="nofollow" href=""></a>>
   * CVE-2015-1789
     <<a  rel="nofollow" href=""></a>>
   * CVE-2015-1790
     <<a  rel="nofollow" href=""></a>>
   * CVE-2015-4000
     <<a  rel="nofollow" href=""></a>>