File _patchinfo of Package patchinfo.703
<patchinfo incident="703">
<issue id="933911" tracker="bnc">CVE-2015-1791: openssl: race condition in NewSessionTicket</issue>
<issue id="931698" tracker="bnc">openssl: The Logjam Attack / weakdh.org</issue>
<issue id="934489" tracker="bnc">CVE-2015-1789: openssl,openssl1: OpenSSL: Exploitable out-of-bounds read in X509_cmp_time</issue>
<issue id="933898" tracker="bnc">CVE-2015-3216: openssl: Crash in ssleay_rand_bytes due to locking regression</issue>
<issue id="934487" tracker="bnc">CVE-2015-1788: openssl,openssl1: OpenSSL: Malformed ECParameters causes infinite loop</issue>
<issue id="929678" tracker="bnc">openssl: Timing side channel in RSA decryption</issue>
<issue id="934491" tracker="bnc">CVE-2015-1790 : openssl,openssl1: PKCS7 crash with missing EnvelopedContent</issue>
<issue id="934493" tracker="bnc">CVE-2015-1792: openssl,openssl1: CMS verify infinite loop with unknown hash function</issue>
<issue id="879179" tracker="bnc">ECHDE filtered out when using HIGH in openssl ciphersuite</issue>
<issue id="CVE-2015-1789" tracker="cve" />
<issue id="CVE-2015-1788" tracker="cve" />
<issue id="CVE-2015-1790" tracker="cve" />
<issue id="CVE-2015-1791" tracker="cve" />
<issue id="CVE-2015-1792" tracker="cve" />
<issue id="CVE-2015-3216" tracker="cve" />
<issue id="CVE-2015-4000" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>vitezslav_cizek</packager>
<description>
This update fixes the following security issues:
- CVE-2015-4000 (boo#931698)
* The Logjam Attack / weakdh.org
* reject connections with DH parameters shorter than 1024 bits
* generates 2048-bit DH parameters by default
- CVE-2015-1788 (boo#934487)
* Malformed ECParameters causes infinite loop
- CVE-2015-1789 (boo#934489)
* Exploitable out-of-bounds read in X509_cmp_time
- CVE-2015-1790 (boo#934491)
* PKCS7 crash with missing EnvelopedContent
- CVE-2015-1792 (boo#934493)
* CMS verify infinite loop with unknown hash function
- CVE-2015-1791 (boo#933911)
* race condition in NewSessionTicket
- CVE-2015-3216 (boo#933898)
* Crash in ssleay_rand_bytes due to locking regression
* modified openssl-1.0.1i-fipslocking.patch
- fix timing side channel in RSA decryption (bnc#929678)
- add ECC ciphersuites to DEFAULT (bnc#879179)
- Disable EXPORT ciphers by default (bnc#931698, comment #3)
</description>
<summary>Security update for compat-openssl098</summary>
</patchinfo>