SUSE 5015 Published by

An openssl security update has been released for openSUSE 11.3/11.4



______________________________________________________________________________

Announcement ID: openSUSE-SU-2012:0083-1
Rating: important
References: #739719
Cross-References: CVE-2011-4108 CVE-2011-4576 CVE-2011-4577
CVE-2011-4619 CVE-2012-0027
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

Various security vulnerabilities have been fixed in openssl:

- DTLS plaintext recovery attack (CVE-2011-4108)
- uninitialized SSL 3.0 padding (CVE-2011-4576)
- malformed RFC 3779 data can cause assertion failures
(CVE-2011-4577)
- SGC restart DoS attack (CVE-2011-4619)
- invalid GOST parameters DoS attack (CVE-2012-0027)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch libopenssl-devel-5634

- openSUSE 11.3:

zypper in -t patch libopenssl-devel-5634

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64):

libopenssl-devel-1.0.0c-18.23.1
libopenssl1_0_0-1.0.0c-18.23.1
openssl-1.0.0c-18.23.1

- openSUSE 11.4 (x86_64):

libopenssl1_0_0-32bit-1.0.0c-18.23.1

- openSUSE 11.4 (noarch):

openssl-doc-1.0.0c-18.23.1

- openSUSE 11.3 (i586 x86_64):

libopenssl-devel-1.0.0-6.13.1
libopenssl1_0_0-1.0.0-6.13.1
openssl-1.0.0-6.13.1

- openSUSE 11.3 (x86_64):

libopenssl1_0_0-32bit-1.0.0-6.13.1

- openSUSE 11.3 (noarch):

openssl-doc-1.0.0-6.13.1


References:

http://support.novell.com/security/cve/CVE-2011-4108.html
http://support.novell.com/security/cve/CVE-2011-4576.html
http://support.novell.com/security/cve/CVE-2011-4577.html
http://support.novell.com/security/cve/CVE-2011-4619.html
http://support.novell.com/security/cve/CVE-2012-0027.html
https://bugzilla.novell.com/739719