File _patchinfo of Package patchinfo.4105
<patchinfo incident="4105">
<issue id="1022271" tracker="bnc">X509_get_default_cert_file() returns an incorrect path</issue>
<issue id="1001912" tracker="bnc">incomplete fix for VUL-0: CVE-2016-2183: openssl: Birthday attacks on 64-bit block ciphers aka triple-des (SWEET32)</issue>
<issue id="1019334" tracker="bnc">VUL-1: CVE-2016-7056: openssl: ECSDA P-256 timing attack key recovery</issue>
<issue id="1005878" tracker="bnc">VUL-1: CVE-2016-8610: openssl: remote denial of service in SSL alert handling</issue>
<issue id="1021641" tracker="bnc">VUL-0: openssl: tracker bug for January 26th 2017 release</issue>
<issue id="1000677" tracker="bnc">SLES12 SP2 RC2 - Segmentation fault in 'openssl speed' when engine library file cannot be found</issue>
<issue id="1004499" tracker="bnc">VUL-1: openssl: Include additional patch for CVE-2016-2108</issue>
<issue id="1022085" tracker="bnc">VUL-0: CVE-2017-3731: openssl: Truncated packet could crash via OOB read</issue>
<issue id="2016-8610" tracker="cve" />
<issue id="2016-7056" tracker="cve" />
<issue id="2016-2108" tracker="cve" />
<issue id="2017-3731" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>vitezslav_cizek</packager>
<description>
This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085, CVE-2017-3731)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- fix ca-bundle path (bsc#1022271)
</description>
<summary>Security update for openssl</summary>
</patchinfo>