File _patchinfo of Package patchinfo.302
<patchinfo incident="302">
<issue id="895129" tracker="bnc">FIPS: openssl: ruby/python hangs when doing ssl when using fips=1</issue>
<issue id="912015" tracker="bnc">VUL-0: CVE-2014-3572: openssl: ECDH downgrade bug fix</issue>
<issue id="855676" tracker="bnc">FIPS: openssl tracker bug</issue>
<issue id="912018" tracker="bnc">VUL-0: CVE-2014-8275: openssl: Fix various certificate fingerprint issues</issue>
<issue id="906878" tracker="bnc">L3-Question: openssl1 client doesn't negotiate EC curve</issue>
<issue id="912296" tracker="bnc">VUL-0: CVE-2014-3570: openssl: Bignum squaring may produce incorrect results</issue>
<issue id="912294" tracker="bnc">VUL-0: CVE-2014-3571: openssl: Fix crash in dtls1_get_record</issue>
<issue id="912293" tracker="bnc">VUL-0: CVE-2015-0205: openssl: Unauthenticated DH client certificate fix.</issue>
<issue id="912292" tracker="bnc">VUL-0: CVE-2015-0206: openssl: memory leak can occur in dtls1_buffer_record</issue>
<issue id="908372" tracker="bnc">FIPS: openssl: constant reseeding when using /dev/urandom</issue>
<issue id="912014" tracker="bnc">VUL-0: CVE-2015-0204: openssl: Only allow ephemeral RSA keys in export ciphersuites.</issue>
<issue id="908362" tracker="bnc">FIPS: openssl: make RSA key generation more strict (BSI advice)</issue>
<issue id="901902" tracker="bnc">FIPS: openssl: RSA not FIPS 186-4 compliant</issue>
<issue id="CVE-2014-3571" tracker="cve" />
<issue id="CVE-2014-3570" tracker="cve" />
<issue id="CVE-2014-3572" tracker="cve" />
<issue id="CVE-2014-8275" tracker="cve" />
<issue id="CVE-2015-0205" tracker="cve" />
<issue id="CVE-2015-0204" tracker="cve" />
<issue id="CVE-2015-0206" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>vitezslav_cizek</packager>
<description>
OpenSSL was updated to fix security issues and also provide FIPS
compliance.
Security issues fixed:
CVE-2014-3570: Bignum squaring (BN_sqr) may have produced
incorrect results on some platforms, including x86_64.
CVE-2014-3571: Fixed crash in dtls1_get_record whilst in the
listen state where you get two separate reads performed - one for the
header and one for the body of the handshake record.
CVE-2014-3572: No longer accept a handshake using an ephemeral ECDH
ciphersuites with the server key exchange message omitted.
CVE-2014-8275: Fixed various certificate fingerprint issues.
CVE-2015-0204: Only allow ephemeral RSA keys in export ciphersuites.
CVE-2015-0205: Fix to prevent use of DH client certificates without
sending certificate verify message.
CVE-2015-0206: A memory leak could have occured in dtls1_buffer_record.
Bugfixes:
- Do not advertise curves we don't support (bsc#906878)
FIPS changes:
- Make RSA2 key generation FIPS 186-4 compliant (bsc#901902)
- X9.31 rand method is not allowed in FIPS mode.
- Do not allow dynamic ENGINEs loading in FIPS mode.
- Added a locking hack which prevents hangs in FIPS mode (bsc#895129)
- In non-FIPS RSA key generation, mirror the maximum and minimum limiters from
FIPS rsa generation to meet Common Criteria and BSI TR requirements
on minimum and maximum distances between p and q. (bsc#908362)
- Do constant reseeding from /dev/urandom; for every random byte pulled, seed with
one byte from /dev/urandom, also change RAND_poll to pull the full state size of
the SSLEAY DRBG to fulfil Common Criteria requirements. (bsc#908372)
FIPS mode can be enabled by either using the environment variable OPENSSL_FORCE_FIPS_MODE=1
or supplying the "fips=1" parameter on the kernel boot commandline.
</description>
<summary>Security update for openssl</summary>
</patchinfo>