SUSE Security Update: Security update for OpenSSL
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0761-1
Rating:             critical
References:         #859228 #859924 #860332 #862181 #869945 #870192 
                    #880891 
Cross-References:   CVE-2014-0076 CVE-2014-0221 CVE-2014-0224
                    CVE-2014-3470
Affected Products:
                    SUSE Linux Enterprise Server 11 SP2 LTSS
                    SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________

   An update that solves four vulnerabilities and has three
   fixes is now available. It includes one version update.

Description:


   OpenSSL was updated to fix several vulnerabilities:

       * SSL/TLS MITM vulnerability. (CVE-2014-0224)
       * DTLS recursion flaw. (CVE-2014-0221)
       * Anonymous ECDH denial of service. (CVE-2014-3470)
       * Using the FLUSH+RELOAD Cache Side-channel Attack the nonces could
         have been recovered. (CVE-2014-0076)

   Further information can be found at
       .

   Additionally, the following non-security fixes and enhancements have been
   included in this release:

       * Ensure that the stack is marked non-executable on x86 32bit. On
         other processor platforms it was already marked as non-executable
         before. (bnc#870192)
       * IPv6 support was added to the openssl s_client and s_server command
         line tool. (bnc#859228)
       * The openssl command line tool now checks certificates by default
         against /etc/ssl/certs (this can be changed via the -CApath option).
         (bnc#860332)
       * The Elliptic Curve Diffie-Hellman key exchange selector was enabled
         and can be selected by kECDHE, kECDH, ECDH tags in the SSL cipher
         string. (bnc#859924)
       * If an optional openssl1 command line tool is installed in parallel,
         c_rehash uses it to generate certificate hashes in both OpenSSL 0
         and OpenSSL 1 style. This allows parallel usage of OpenSSL 0.9.8j
         and OpenSSL 1.x client libraries with a shared certificate store.
         (bnc#862181)

   Security Issues references:

       * CVE-2014-0224
         
       * CVE-2014-0221
         
       * CVE-2014-3470
         
       * CVE-2014-0076
         


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP2 LTSS:

      zypper in -t patch slessp2-libopenssl-devel-9324

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-libopenssl-devel-9323

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):

      libopenssl0_9_8-0.9.8j-0.58.1
      libopenssl0_9_8-hmac-0.9.8j-0.58.1
      openssl-0.9.8j-0.58.1
      openssl-doc-0.9.8j-0.58.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64):

      libopenssl0_9_8-32bit-0.9.8j-0.58.1
      libopenssl0_9_8-hmac-32bit-0.9.8j-0.58.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 0.9.8j]:

      libopenssl0_9_8-0.9.8j-0.58.1
      libopenssl0_9_8-hmac-0.9.8j-0.58.1
      openssl-0.9.8j-0.58.1
      openssl-doc-0.9.8j-0.58.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64) [New Version: 0.9.8j]:

      libopenssl0_9_8-32bit-0.9.8j-0.58.1
      libopenssl0_9_8-hmac-32bit-0.9.8j-0.58.1


References:

   https://www.suse.com/security/cve/CVE-2014-0076.html
   https://www.suse.com/security/cve/CVE-2014-0221.html
   https://www.suse.com/security/cve/CVE-2014-0224.html
   https://www.suse.com/security/cve/CVE-2014-3470.html
   https://bugzilla.novell.com/859228
   https://bugzilla.novell.com/859924
   https://bugzilla.novell.com/860332
   https://bugzilla.novell.com/862181
   https://bugzilla.novell.com/869945
   https://bugzilla.novell.com/870192
   https://bugzilla.novell.com/880891
   https://scc.suse.com:443/patches/
   https://scc.suse.com:443/patches/

SuSE: 2014:0761-1: critical: OpenSSL

June 6, 2014
An update that solves four vulnerabilities and has three An update that solves four vulnerabilities and has three An update that solves four vulnerabilities and has three fixes is ...

Summary

OpenSSL was updated to fix several vulnerabilities: * SSL/TLS MITM vulnerability. (CVE-2014-0224) * DTLS recursion flaw. (CVE-2014-0221) * Anonymous ECDH denial of service. (CVE-2014-3470) * Using the FLUSH+RELOAD Cache Side-channel Attack the nonces could have been recovered. (CVE-2014-0076) Further information can be found at . Additionally, the following non-security fixes and enhancements have been included in this release: * Ensure that the stack is marked non-executable on x86 32bit. On other processor platforms it was already marked as non-executable before. (bnc#870192) * IPv6 support was added to the openssl s_client and s_server command line tool. (bnc#859228) * The openssl command line tool now checks certificates by default against /etc/ssl/certs (this can be changed via the -CApath option). (bnc#860332) * The Elliptic Curve Diffie-Hellm...

Read the Full Advisory

References

#859228 #859924 #860332 #862181 #869945 #870192

#880891

Cross- CVE-2014-0076 CVE-2014-0221 CVE-2014-0224

CVE-2014-3470

Affected Products:

SUSE Linux Enterprise Server 11 SP2 LTSS

SUSE Linux Enterprise Server 11 SP1 LTSS

https://www.suse.com/security/cve/CVE-2014-0076.html

https://www.suse.com/security/cve/CVE-2014-0221.html

https://www.suse.com/security/cve/CVE-2014-0224.html

https://www.suse.com/security/cve/CVE-2014-3470.html

https://bugzilla.novell.com/859228

https://bugzilla.novell.com/859924

https://bugzilla.novell.com/860332

https://bugzilla.novell.com/862181

https://bugzilla.novell.com/869945

https://bugzilla.novell.com/870192

https://bugzilla.novell.com/880891

https://scc.suse.com:443/patches/

https://scc.suse.com:443/patches/

Severity
Announcement ID: SUSE-SU-2014:0761-1
Rating: critical

Related News