SuSE 11.3 Security Update : OpenSSL (SAT Patch Number 10150)
Medium Nessus Plugin ID 81124
The remote SuSE 11 host is missing one or more security updates.
OpenSSL has been updated to fix various security issues. More information can be found in the OpenSSL advisory: http://openssl.org/news/secadv_20150108.txt . The following issues have been fixed : - Bignum squaring (BN_sqr) may produce incorrect results on some platforms, including x86_64. (bsc#912296). (CVE-2014-3570) - Fix crash in dtls1_get_record whilst in the listen state where you get two separate reads performed - one for the header and one for the body of the handshake record. (bsc#912294). (CVE-2014-3571) - Don't accept a handshake using an ephemeral ECDH ciphersuites with the server key exchange message omitted. (bsc#912015). (CVE-2014-3572) - Fix various certificate fingerprint issues. (bsc#912018). (CVE-2014-8275) - Only allow ephemeral RSA keys in export ciphersuites. (bsc#912014). (CVE-2015-0204) - OpenSSL 0.9.8j is NOT vulnerable to CVE-2015-0205 as it doesn't support DH certificates and this typo prohibits skipping of certificate verify message for sign only certificates anyway. (bsc#912293). (CVE-2015-0205)