File _patchinfo of Package patchinfo.703

<patchinfo incident="703">
  <issue id="933911" tracker="bnc">CVE-2015-1791: openssl: race condition in NewSessionTicket</issue>
  <issue id="931698" tracker="bnc">openssl: The Logjam Attack / weakdh.org</issue>
  <issue id="934489" tracker="bnc">CVE-2015-1789: openssl,openssl1:  OpenSSL: Exploitable out-of-bounds read in X509_cmp_time</issue>
  <issue id="933898" tracker="bnc">CVE-2015-3216: openssl: Crash in ssleay_rand_bytes due to locking regression</issue>
  <issue id="934487" tracker="bnc">CVE-2015-1788: openssl,openssl1:  OpenSSL: Malformed ECParameters causes infinite loop</issue>
  <issue id="929678" tracker="bnc">openssl: Timing side channel in RSA decryption</issue>
  <issue id="934491" tracker="bnc">CVE-2015-1790 : openssl,openssl1:  PKCS7 crash with missing EnvelopedContent</issue>
  <issue id="934493" tracker="bnc">CVE-2015-1792: openssl,openssl1:  CMS verify infinite loop with unknown hash function</issue>
  <issue id="879179" tracker="bnc">ECHDE filtered out when using HIGH in openssl ciphersuite</issue>
  <issue id="CVE-2015-1789" tracker="cve" />
  <issue id="CVE-2015-1788" tracker="cve" />
  <issue id="CVE-2015-1790" tracker="cve" />
  <issue id="CVE-2015-1791" tracker="cve" />
  <issue id="CVE-2015-1792" tracker="cve" />
  <issue id="CVE-2015-3216" tracker="cve" />
  <issue id="CVE-2015-4000" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>vitezslav_cizek</packager>
  <description>
This update fixes the following security issues:

- CVE-2015-4000 (boo#931698)
  * The Logjam Attack / weakdh.org
  * reject connections with DH parameters shorter than 1024 bits
  * generates 2048-bit DH parameters by default
- CVE-2015-1788 (boo#934487)
  * Malformed ECParameters causes infinite loop
- CVE-2015-1789 (boo#934489)
  * Exploitable out-of-bounds read in X509_cmp_time
- CVE-2015-1790 (boo#934491)
  * PKCS7 crash with missing EnvelopedContent
- CVE-2015-1792 (boo#934493)
  * CMS verify infinite loop with unknown hash function
- CVE-2015-1791 (boo#933911)
  * race condition in NewSessionTicket
- CVE-2015-3216 (boo#933898)
  * Crash in ssleay_rand_bytes due to locking regression
  * modified openssl-1.0.1i-fipslocking.patch
- fix timing side channel in RSA decryption (bnc#929678)
- add ECC ciphersuites to DEFAULT (bnc#879179)
- Disable EXPORT ciphers by default (bnc#931698, comment #3)
</description>
  <summary>Security update for compat-openssl098</summary>
</patchinfo>
openSUSE Build Service is sponsored by