Commit graph

14 commits

Author SHA1 Message Date
obache
5be2a0a5f4 Apply following update to suse131_openssl, bump PKGREVISION.
openSUSE Security Update: Security update for openssl
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2015:0130-1
Rating:             important
References:         #911399 #912014 #912015 #912018 #912292 #912293
                    #912294 #912296
Cross-References:   CVE-2014-3569 CVE-2014-3570 CVE-2014-3571
                    CVE-2014-3572 CVE-2014-8275 CVE-2015-0204
                    CVE-2015-0205 CVE-2015-0206
Affected Products:
                    openSUSE 13.2
                    openSUSE 13.1
______________________________________________________________________________

   An update that fixes 8 vulnerabilities is now available.

Description:


   openssl was updated to 1.0.1k to fix various security issues and bugs.

   More information can be found in the openssl advisory:
   http://openssl.org/news/secadv_20150108.txt

   Following issues were fixed:

   * CVE-2014-3570 (bsc#912296): Bignum squaring (BN_sqr) may have produced
     incorrect results on some platforms, including x86_64.

   * CVE-2014-3571 (bsc#912294): Fixed crash in dtls1_get_record whilst in
     the listen state where you get two separate reads performed - one for
     the header and one for the body of the handshake record.

   * CVE-2014-3572 (bsc#912015): Don't accept a handshake using an ephemeral
     ECDH ciphersuites with the server key exchange message omitted.

   * CVE-2014-8275 (bsc#912018): Fixed various certificate fingerprint issues.

   * CVE-2015-0204 (bsc#912014): Only allow ephemeral RSA keys in export
     ciphersuites

   * CVE-2015-0205 (bsc#912293): A fixwas added to prevent use of DH client
     certificates without sending certificate verify message.

   * CVE-2015-0206 (bsc#912292): A memory leak was fixed in
     dtls1_buffer_record.

References:

   http://support.novell.com/security/cve/CVE-2014-3569.html
   http://support.novell.com/security/cve/CVE-2014-3570.html
   http://support.novell.com/security/cve/CVE-2014-3571.html
   http://support.novell.com/security/cve/CVE-2014-3572.html
   http://support.novell.com/security/cve/CVE-2014-8275.html
   http://support.novell.com/security/cve/CVE-2015-0204.html
   http://support.novell.com/security/cve/CVE-2015-0205.html
   http://support.novell.com/security/cve/CVE-2015-0206.html
   https://bugzilla.suse.com/show_bug.cgi?id=911399
   https://bugzilla.suse.com/show_bug.cgi?id=912014
   https://bugzilla.suse.com/show_bug.cgi?id=912015
   https://bugzilla.suse.com/show_bug.cgi?id=912018
   https://bugzilla.suse.com/show_bug.cgi?id=912292
   https://bugzilla.suse.com/show_bug.cgi?id=912293
   https://bugzilla.suse.com/show_bug.cgi?id=912294
   https://bugzilla.suse.com/show_bug.cgi?id=912296
2015-01-24 01:01:54 +00:00
obache
7a65b8478b Bump PKGREVISION to 11 for suse131_openssl.
openSUSE Security Update: openssl: fixed elliptic curve handshake failure
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2014:1474-1
Rating:             low
References:         #905037
Affected Products:
                    openSUSE 13.2
                    openSUSE 13.1
                    openSUSE 12.3
______________________________________________________________________________

   An update that contains security fixes can now be installed.

Description:


   This openssl update fixes a TLS handshake problem when elliptic curves are
   in use.
2014-11-24 10:47:45 +00:00
obache
1a2985aa3f Apply following security update to suse131_openssl, bump PKGREVISION to 10.
openSUSE Security Update: update for openssl
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2014:1331-1
Rating:             important
References:         #901223 #901277
Cross-References:   CVE-2014-3513 CVE-2014-3566 CVE-2014-3567
                    CVE-2014-3568
Affected Products:
                    openSUSE 13.1
                    openSUSE 12.3
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   The following issues were fixed in this release:

   CVE-2014-3566: SSLv3 POODLE attack (bnc#901223) CVE-2014-3513,
   CVE-2014-3567:  DTLS memory leak and session ticket memory leak
2014-11-03 09:28:39 +00:00
obache
4a631931c8 define PKGNAME instead of fake DISTNAME. 2014-09-07 12:26:39 +00:00
obache
19c08321d3 openSUSE Security Update: update for openssl
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2014:1052-1
Rating:             moderate
References:         #890764 #890765 #890766 #890767 #890768 #890769
                    #890770 #890771 #890772
Cross-References:   CVE-2014-3505 CVE-2014-3506 CVE-2014-3507
                    CVE-2014-3508 CVE-2014-3509 CVE-2014-3510
                    CVE-2014-3511 CVE-2014-3512 CVE-2014-5139

Affected Products:
                    openSUSE 13.1
                    openSUSE 12.3
______________________________________________________________________________

   An update that fixes 9 vulnerabilities is now available.

Description:

   This openssl update fixes the following security issues:

   - openssl 1.0.1i
   * Information leak in pretty printing functions (CVE-2014-3508)
   * Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
   * Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
   * Double Free when processing DTLS packets (CVE-2014-3505)
   * DTLS memory exhaustion (CVE-2014-3506)
   * DTLS memory leak from zero-length fragments (CVE-2014-3507)
   * OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
   * OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
   * SRP buffer overrun (CVE-2014-3512)
2014-08-22 08:43:09 +00:00
obache
2a3bc4b5dd Apply openSUSE-SU-2014:0764-1
openSUSE Security Update: openssl: update to version 1.0.1h

Description:

   The openssl library was updated to version 1.0.1h fixing various security
   issues and bugs:

   Security issues fixed:
   - CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully
     crafted handshake can force the use of weak keying material in OpenSSL
     SSL/TLS clients and servers.
   - CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS
     handshake to an OpenSSL DTLS client the code can be made to recurse
     eventually crashing in a DoS attack.
   - CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer
     overrun attack can be triggered by sending invalid DTLS fragments to an
      OpenSSL DTLS client or server. This is potentially exploitable to run
      arbitrary code on a vulnerable client or server.
   - CVE-2014-3470: Fix bug in TLS code where clients enable anonymous ECDH
     ciphersuites are subject to a denial of service attack.

Bump PKGREVISION.
2014-06-06 09:53:29 +00:00
obache
0f2356c468 Apply openSUSE Security Update: openSUSE-SU-2014:0635-1
update for openssl

Description:

   - Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer
   dereference in do_ssl3_write Add file: CVE-2014-0198.patch

Bump PKGREVISION.
2014-05-14 09:31:44 +00:00
obache
a42df4ac6b Apply Security Update: openSUSE-SU-2014:0592-1
OpenSSL: Fixed a use-after-free race condition in OpenSSL's read buffer.

Description:

    A use-after-free race condition in OpenSSL's read buffer
    was fixed that could cause connections to drop
    (CVE-2010-5298).

Bump PKGREVISION.
2014-05-03 02:10:06 +00:00
obache
e9bb1acce1 Apply Security Update: openSUSE-SU-2014:0560-1
update for openssl

   This is an openssl version update to 1.0.1g.

   - The main reason for this upgrade was to be clear about
   the TLS  heartbeat problem know as "Heartbleed"
   (CVE-2014-0160). That  problem was already fixed in our
   previous openssl update.

Bump PKGREVISION.
2014-04-23 13:14:42 +00:00
obache
29e5080c3b Update to libopenssl1_0_0-1.0.1e-11.32.1 for CVE-2014-0160.
Bump PKGREVISION.
2014-04-08 14:46:39 +00:00
obache
ed4c053aed Update suse131_openssl RPM to libopenssl1_0_0-1.0.1e-11.28.1 for CVE-2014-0076.
Bump PKGREVISION.
2014-04-04 12:50:14 +00:00
obache
d37eb69950 Update rpm to libopenssl1_0_0-1.0.1e-11.14.1 for CVE-2013-4353.
Bump PKGREVISION.
2014-01-20 12:18:12 +00:00
obache
8606b86732 Update rpm to libopenssl1_0_0-1.0.1e-11.10.1 for CVE-2013-6449.
Bump PKGREVISION.
2014-01-05 09:44:59 +00:00
obache
80251b35d0 Added openSUSE 13.1 packages, provides a number of components for a
openSUSE-based Linux binary emulation environment.
2013-12-05 11:42:12 +00:00