SUSE Security Update: Security update for openssl1
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1357-1
Rating:             important
References:         #901223 #901277 
Cross-References:   CVE-2014-3513 CVE-2014-3566 CVE-2014-3567
                    CVE-2014-3568
Affected Products:
                    SUSE Linux Enterprise Security Module 11 SP3
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:


   This OpenSSL update fixes the following issues:

       * SRTP Memory Leak (CVE-2014-3513)
       * Session Ticket Memory Leak (CVE-2014-3567)
       * Build option no-ssl3 is incomplete (CVE-2014-3568)
       * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

   Security Issues:

       * CVE-2014-3513
         
       * CVE-2014-3567
         
       * CVE-2014-3566
         
       * CVE-2014-3568
         

Indications:

   Everybody should update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Security Module 11 SP3:

      zypper in -t patch secsp3-libopenssl1-devel-9904

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Security Module 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      libopenssl1-devel-1.0.1g-0.22.1
      libopenssl1_0_0-1.0.1g-0.22.1
      openssl1-1.0.1g-0.22.1
      openssl1-doc-1.0.1g-0.22.1

   - SUSE Linux Enterprise Security Module 11 SP3 (ppc64 s390x x86_64):

      libopenssl1_0_0-32bit-1.0.1g-0.22.1

   - SUSE Linux Enterprise Security Module 11 SP3 (ia64):

      libopenssl1_0_0-x86-1.0.1g-0.22.1


References:

   https://www.suse.com/security/cve/CVE-2014-3513.html
   https://www.suse.com/security/cve/CVE-2014-3566.html
   https://www.suse.com/security/cve/CVE-2014-3567.html
   https://www.suse.com/security/cve/CVE-2014-3568.html
   https://bugzilla.suse.com/show_bug.cgi?id=901223
   https://bugzilla.suse.com/show_bug.cgi?id=901277
   https://scc.suse.com:443/patches/

SuSE: 2014:1357-1: important: openssl1

November 4, 2014
An update that fixes four vulnerabilities is now available

Summary

This OpenSSL update fixes the following issues: * SRTP Memory Leak (CVE-2014-3513) * Session Ticket Memory Leak (CVE-2014-3567) * Build option no-ssl3 is incomplete (CVE-2014-3568) * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE) Security Issues: * CVE-2014-3513 * CVE-2014-3567 * CVE-2014-3566 * CVE-2014-3568 Indications: Everybody should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Security Module 11 SP3: zypper in -t patch secsp3-libopenssl1-devel-9904 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Security Module 11 SP3 (i586 ia64 ppc64 s390x x86_64): libopenssl1-devel-1.0.1g-0.22.1 libopenssl1_0_0-1.0.1g-0.22.1 openssl1-1.0.1g-...

Read the Full Advisory

References

#901223 #901277

Cross- CVE-2014-3513 CVE-2014-3566 CVE-2014-3567

CVE-2014-3568

Affected Products:

SUSE Linux Enterprise Security Module 11 SP3

https://www.suse.com/security/cve/CVE-2014-3513.html

https://www.suse.com/security/cve/CVE-2014-3566.html

https://www.suse.com/security/cve/CVE-2014-3567.html

https://www.suse.com/security/cve/CVE-2014-3568.html

https://bugzilla.suse.com/show_bug.cgi?id=901223

https://bugzilla.suse.com/show_bug.cgi?id=901277

https://scc.suse.com:443/patches/

Severity
Announcement ID: SUSE-SU-2014:1357-1
Rating: important

Related News