Security update for OpenSSL (important)

2015-07-03T20:08:44
ID SUSE-SU-2015:1183-2
Type suse
Reporter Suse
Modified 2015-07-03T20:08:44

Description

OpenSSL was updated to fix several security issues.

   * CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed
     by rejecting connections with DH parameters shorter than 1024 bits.
     We now also generate 2048-bit DH parameters by default.
   * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
   * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
     was fixed.
   * fixed a timing side channel in RSA decryption (bnc#929678)

Additional changes:

   * In the default SSL cipher string EXPORT ciphers are now disabled.
     This will only get active if applications get rebuilt and actually
     use this string. (bnc#931698)

Security Issues:

   * CVE-2015-1789
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789</a>>
   * CVE-2015-1790
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790</a>>
   * CVE-2015-4000
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000</a>>