- Home
- CVEs with nessus.description==This update fixes the following security issues :
- CVE-2015-4000 (boo#931698)
- The Logjam Attack / weakdh.org
- reject connections with DH parameters shorter than 1024
bits
- generates 2048-bit DH parameters by default
- CVE-2015-1788 (boo#934487)
- Malformed ECParameters causes infinite loop
- CVE-2015-1789 (boo#934489)
- Exploitable out-of-bounds read in X509_cmp_time
- CVE-2015-1790 (boo#934491)
- PKCS7 crash with missing EnvelopedContent
- CVE-2015-1792 (boo#934493)
- CMS verify infinite loop with unknown hash function
- CVE-2015-1791 (boo#933911)
- race condition in NewSessionTicket
- CVE-2015-3216 (boo#933898)
- Crash in ssleay_rand_bytes due to locking regression
- modified openssl-1.0.1i-fipslocking.patch
- fix timing side channel in RSA decryption (bnc#929678)
- add ECC ciphersuites to DEFAULT (bnc#879179)
- Disable EXPORT ciphers by default (bnc#931698, comment
#3)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top