SUSE-SU-2017:0495-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:0495-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:0495-1
Related
Published
2017-02-17T13:29:39Z
Modified
2017-02-17T13:29:39Z
Summary
Security update for openssl1
Details

This update for openssl1 fixes the following issues contained in the OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed: - CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334) - CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878) - CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085) - Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912) - CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)

Bugs fixed: - fix crash in openssl speed (bsc#1000677) - call c_rehash in %post (bsc#1001707) - ship static libraries in the devel package (bsc#1022644)

References

Affected packages

SUSE:Linux Enterprise Server 11-SECURITY / openssl1

Package

Name
openssl1
Purl
purl:rpm/suse/openssl1&distro=SUSE%20Linux%20Enterprise%20Server%2011-SECURITY

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1g-0.57.1

Ecosystem specific

{
    "binaries": [
        {
            "openssl1-doc": "1.0.1g-0.57.1",
            "libopenssl1_0_0": "1.0.1g-0.57.1",
            "libopenssl1_0_0-32bit": "1.0.1g-0.57.1",
            "libopenssl1_0_0-x86": "1.0.1g-0.57.1",
            "openssl1": "1.0.1g-0.57.1",
            "libopenssl1-devel": "1.0.1g-0.57.1"
        }
    ]
}