Changelog for
libopenssl-devel-1.0.2n-2.58.18.x86_64.rpm :
* Fri Jun 12 2015 vcizekAATTsuse.com- CVE-2015-4000 (boo#931698)
* The Logjam Attack / weakdh.org
* reject connections with DH parameters shorter than 768 bits
* generates 2048-bit DH parameters by default- CVE-2015-1788 (boo#934487)
* Malformed ECParameters causes infinite loop- CVE-2015-1789 (boo#934489)
* Exploitable out-of-bounds read in X509_cmp_time- CVE-2015-1790 (boo#934491)
* PKCS7 crash with missing EnvelopedContent- CVE-2015-1792 (boo#934493)
* CMS verify infinite loop with unknown hash function- CVE-2015-1791 (boo#933911)
* race condition in NewSessionTicket- CVE-2015-3216 (boo#933898)
* Crash in ssleay_rand_bytes due to locking regression
* modified openssl-1.0.1e-new-fips-reqs.patch.- newly added patches:
* 0001-s_server-Use-2048-bit-DH-parameters-by-default.patch
* 0002-dhparam-set-the-default-to-2048-bits.patch
* 0003-dhparam-fix-documentation.patch
* 0004-Update-documentation-with-Diffie-Hellman-best-practi.patch
* 0005-client-reject-handshakes-with-DH-parameters-768-bits.patch
* openssl-CVE-2015-1788.patch
* openssl-CVE-2015-1789.patch
* openssl-CVE-2015-1790.patch
* openssl-CVE-2015-1791.patch
* openssl-CVE-2015-1792.patch
* Mon Mar 16 2015 vcizekAATTsuse.com- security update:
* CVE-2015-0209 (bnc#919648) - Fix a failure to NULL a pointer freed on error
* CVE-2015-0286 (bnc#922496) - Segmentation fault in ASN1_TYPE_cmp
* CVE-2015-0287 (bnc#922499) - ASN.1 structure reuse memory corruption
* CVE-2015-0288 x509: (bnc#920236) - added missing public key is not NULL check
* CVE-2015-0289 (bnc#922500) - PKCS7 NULL pointer dereferences
* CVE-2015-0293 (bnc#922488) - Fix reachable assert in SSLv2 servers
* added patches: openssl-CVE-2015-0209.patch openssl-CVE-2015-0286.patch openssl-CVE-2015-0287.patch openssl-CVE-2015-0288.patch openssl-CVE-2015-0289.patch openssl-CVE-2015-0293.patch
* Thu Jan 08 2015 crrodriguezAATTopensuse.org- Upgrade to 1.0.1k bsc#912294 CVE-2014-3571: Fix DTLS segmentation fault in dtls1_get_record. bsc#912292 CVE-2015-0206: Fix DTLS memory leak in dtls1_buffer_record. bsc#911399 CVE-2014-3569: Fix issue where no-ssl3 configuration sets method to NULL. bsc#912015 CVE-2014-3572: Abort handshake if server key exchange message is omitted for ephemeral ECDH ciphersuites. bsc#912014 CVE-2015-0204: Remove non-export ephemeral RSA code on client and server. bsc#912293 CVE-2015-0205: Fixed issue where DH client certificates are accepted without verification. bsc#912018 CVE-2014-8275: Fix various certificate fingerprint issues. bsc#912296 CVE-2014-3570: Correct Bignum squaring. and other bugfixes.- refresh patches
* Thu Nov 13 2014 kai.koehneAATTtheqtcompany.com- openssl-1.0.1i-noec2m-fix.patch: Fix handshake failures when connecting to some openssl servers. With no-ec2m, openssl advertises EC curves it doesn\'t support, leading to handshake errors with some servers (bnc#905037).
* Fri Nov 07 2014 brianAATTaljex.com- openSUSE < 11.2 doesn\'t have accept4()
* Tue Oct 21 2014 crrodriguezAATTopensuse.org- openSSL 1.0.1j
* Fix SRTP Memory Leak (CVE-2014-3513)
* Session Ticket Memory Leak (CVE-2014-3567)
* Add SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV)
* Build option no-ssl3 is incomplete (CVE-2014-3568)
* Thu Aug 21 2014 meissnerAATTsuse.com- openssl.keyring: the 1.0.1i release was done by Matt Caswell
UK 0E604491
* Thu Aug 14 2014 vcizekAATTsuse.com- rename README.SuSE (old spelling) to README.SUSE (bnc#889013)
* Wed Aug 13 2014 vcizekAATTsuse.com- update to 1.0.1i
* Fix SRP buffer overrun vulnerability. Invalid parameters passed to the SRP code can be overrun an internal buffer. Add sanity check that g, A, B < N to SRP code. (CVE-2014-3512)
* A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate TLS 1.0 instead of higher protocol versions when the ClientHello message is badly fragmented. This allows a man-in-the-middle attacker to force a downgrade to TLS 1.0 even if both the server and the client support a higher protocol version, by modifying the client\'s TLS records. (CVE-2014-3511)
* OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a denial of service attack. A malicious server can crash the client with a null pointer dereference (read) by specifying an anonymous (EC)DH ciphersuite and sending carefully crafted handshake messages. (CVE-2014-3510)
* By sending carefully crafted DTLS packets an attacker could cause openssl to leak memory. This can be exploited through a Denial of Service attack. (CVE-2014-3507)
* An attacker can force openssl to consume large amounts of memory whilst processing DTLS handshake messages. This can be exploited through a Denial of Service attack. (CVE-2014-3506)
* An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack. (CVE-2014-3505)
* If a multithreaded client connects to a malicious server using a resumed session and the server sends an ec point format extension it could write up to 255 bytes to freed memory. (CVE-2014-3509)
* A malicious server can crash an OpenSSL client with a null pointer dereference (read) by specifying an SRP ciphersuite even though it was not properly negotiated with the client. This can be exploited through a Denial of Service attack. (CVE-2014-5139)
* A flaw in OBJ_obj2txt may cause pretty printing functions such as X509_name_oneline, X509_name_print_ex et al. to leak some information from the stack. Applications may be affected if they echo pretty printing output to the attacker. (CVE-2014-3508)
* Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.) for corner cases. (Certain input points at infinity could lead to bogus results, with non-infinity inputs mapped to infinity too.)- refreshed patches:
* openssl-1.0.1e-new-fips-reqs.patch
* 0005-libssl-Hide-library-private-symbols.patch (thanks to Marcus Meissner)
* Mon Jul 21 2014 jengelhAATTinai.de- Move manpages around:
*.1ssl should be in openssl (e.g. ciphers(1ssl) is also referenced by openssl(1)), and
*.3ssl should be in openssl-doc.