SUSE-SU-2017:2968-1: important: Security update for openssl1

\n\n SUSE Security Update: Security update for openssl1

Announcement ID: SUSE-SU-2017:2968-1
Rating: important
References: #1027908 #1032261 #1055825 #1056058 #1057660
#1065363 #990592
Cross-References: CVE-2017-3735
Affected Products:
SUSE Linux Enterprise Server 11-SECURITY

An update that solves one vulnerability and has 6 fixes is
now available.


This update for openssl1 fixes the following issues:

Security issues fixed:

– CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read
– adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
– out of bounds read+crash in DES_fcrypt (bsc#1065363)
– DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
– Missing important ciphers in openssl 1.0.1i-47.1 (bsc#990592)

Bug fixes:

– support alternate root ca chains (bsc#1032261)
– Require openssl1, so c_rehash1 is available during %post to hash the
certificates (bsc#1057660)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 11-SECURITY:

zypper in -t patch secsp3-openssl1-13343=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 11-SECURITY (i586 ia64 ppc64 s390x x86_64):


– SUSE Linux Enterprise Server 11-SECURITY (ppc64 s390x x86_64):


– SUSE Linux Enterprise Server 11-SECURITY (ia64):



To unsubscribe, e-mail:
For additional commands, e-mail: