Security update for OpenSSL (package openssl-devel)
(Last modified: 21FEB2003)
solutions Security update for OpenSSL (package openssl-devel) SuSE Linux Maintenance Web (d7cba6a9980ab28d14a3b2324d17477f)
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Openexchange Server 4
A possible exploitation scenario requires an attacker to be able to perform a man-in-the-middle attack with a network quality good enough to observe timing differences. In addition to that, the endpoints of the encrypted connection may not propagate decoding errors to the application that uses the SSL connection, and the network traffic must repeatedly consist of the same plain text block.
Even though these conditions impose a limit to the severity of the vulnerability, we recommend to update the package on your system with the offered update packages.
rpm -Fvh openssl-devel.rpm
openssl-develpackage contains the static libraries that
are linked to a binary if you compile/link it on your own. If one or
more of your own binaries are linked statically against the openssl
library, it is recommended to recompile these binaries after the
installation of this
openssl-develupdate. If you
update this package containing the static libaries, you should also
update the shared libraries package as described in the maintenace
web article "Security update for OpenSSL" (http://sdb.suse.de/en/psdb/html/4b5e1a52a4e98f479c19123b973042b9.html).
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.