Security update for openssl

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)

Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085, CVE-2017-3731)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)

Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- fix ca-bundle path (bsc#1022271)

This update was imported from the SUSE:SLE-12-SP1:Update update project.

Fixed bugs
bnc#1022271
X509_get_default_cert_file() returns an incorrect path
bnc#1001912
incomplete fix for VUL-0: CVE-2016-2183: openssl: Birthday attacks on 64-bit block ciphers aka triple-des (SWEET32)
bnc#1019334
VUL-1: CVE-2016-7056: openssl: ECSDA P-256 timing attack key recovery
bnc#1005878
VUL-1: CVE-2016-8610: openssl: remote denial of service in SSL alert handling
bnc#1021641
VUL-0: openssl: tracker bug for January 26th 2017 release
bnc#1000677
SLES12 SP2 RC2 - Segmentation fault in 'openssl speed' when engine library file cannot be found
bnc#1004499
VUL-1: openssl: Include additional patch for CVE-2016-2108
bnc#1022085
VUL-0: CVE-2017-3731: openssl: Truncated packet could crash via OOB read
Selected Binaries
openSUSE Build Service is sponsored by