Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libopenssl-devel-1.1.1l-1.2 on GA media

Notes

Title of the patch
libopenssl-devel-1.1.1l-1.2 on GA media
Description of the patch
These are all security issues fixed in the libopenssl-devel-1.1.1l-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11125
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "libopenssl-devel-1.1.1l-1.2 on GA media",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "These are all security issues fixed in the libopenssl-devel-1.1.1l-1.2 package on the GA media of openSUSE Tumbleweed.",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "openSUSE-Tumbleweed-2024-11125",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11125-1.json",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-2937 page",
            url: "https://www.suse.com/security/cve/CVE-2006-2937/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-2940 page",
            url: "https://www.suse.com/security/cve/CVE-2006-2940/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-3738 page",
            url: "https://www.suse.com/security/cve/CVE-2006-3738/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-4339 page",
            url: "https://www.suse.com/security/cve/CVE-2006-4339/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2006-4343 page",
            url: "https://www.suse.com/security/cve/CVE-2006-4343/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-3108 page",
            url: "https://www.suse.com/security/cve/CVE-2007-3108/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2007-5135 page",
            url: "https://www.suse.com/security/cve/CVE-2007-5135/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2008-0891 page",
            url: "https://www.suse.com/security/cve/CVE-2008-0891/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2008-1672 page",
            url: "https://www.suse.com/security/cve/CVE-2008-1672/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2016-7055 page",
            url: "https://www.suse.com/security/cve/CVE-2016-7055/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2016-7056 page",
            url: "https://www.suse.com/security/cve/CVE-2016-7056/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-3731 page",
            url: "https://www.suse.com/security/cve/CVE-2017-3731/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-3732 page",
            url: "https://www.suse.com/security/cve/CVE-2017-3732/",
         },
      ],
      title: "libopenssl-devel-1.1.1l-1.2 on GA media",
      tracking: {
         current_release_date: "2024-06-15T00:00:00Z",
         generator: {
            date: "2024-06-15T00:00:00Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "openSUSE-SU-2024:11125-1",
         initial_release_date: "2024-06-15T00:00:00Z",
         revision_history: [
            {
               date: "2024-06-15T00:00:00Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl-devel-1.1.1l-1.2.aarch64",
                        product: {
                           name: "libopenssl-devel-1.1.1l-1.2.aarch64",
                           product_id: "libopenssl-devel-1.1.1l-1.2.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl-1.1.1l-1.2.aarch64",
                        product: {
                           name: "openssl-1.1.1l-1.2.aarch64",
                           product_id: "openssl-1.1.1l-1.2.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl-devel-1.1.1l-1.2.ppc64le",
                        product: {
                           name: "libopenssl-devel-1.1.1l-1.2.ppc64le",
                           product_id: "libopenssl-devel-1.1.1l-1.2.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl-1.1.1l-1.2.ppc64le",
                        product: {
                           name: "openssl-1.1.1l-1.2.ppc64le",
                           product_id: "openssl-1.1.1l-1.2.ppc64le",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl-devel-1.1.1l-1.2.s390x",
                        product: {
                           name: "libopenssl-devel-1.1.1l-1.2.s390x",
                           product_id: "libopenssl-devel-1.1.1l-1.2.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl-1.1.1l-1.2.s390x",
                        product: {
                           name: "openssl-1.1.1l-1.2.s390x",
                           product_id: "openssl-1.1.1l-1.2.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl-devel-1.1.1l-1.2.x86_64",
                        product: {
                           name: "libopenssl-devel-1.1.1l-1.2.x86_64",
                           product_id: "libopenssl-devel-1.1.1l-1.2.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl-1.1.1l-1.2.x86_64",
                        product: {
                           name: "openssl-1.1.1l-1.2.x86_64",
                           product_id: "openssl-1.1.1l-1.2.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "openSUSE Tumbleweed",
                        product: {
                           name: "openSUSE Tumbleweed",
                           product_id: "openSUSE Tumbleweed",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:tumbleweed",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl-devel-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
            },
            product_reference: "libopenssl-devel-1.1.1l-1.2.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl-devel-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
            },
            product_reference: "libopenssl-devel-1.1.1l-1.2.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl-devel-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
            },
            product_reference: "libopenssl-devel-1.1.1l-1.2.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl-devel-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
            },
            product_reference: "libopenssl-devel-1.1.1l-1.2.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl-1.1.1l-1.2.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
            },
            product_reference: "openssl-1.1.1l-1.2.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl-1.1.1l-1.2.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
            },
            product_reference: "openssl-1.1.1l-1.2.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl-1.1.1l-1.2.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
            },
            product_reference: "openssl-1.1.1l-1.2.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl-1.1.1l-1.2.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            },
            product_reference: "openssl-1.1.1l-1.2.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2006-2937",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-2937",
            },
         ],
         notes: [
            {
               category: "general",
               text: "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-2937",
               url: "https://www.suse.com/security/cve/CVE-2006-2937",
            },
            {
               category: "external",
               summary: "SUSE Bug 202366 for CVE-2006-2937",
               url: "https://bugzilla.suse.com/202366",
            },
            {
               category: "external",
               summary: "SUSE Bug 207635 for CVE-2006-2937",
               url: "https://bugzilla.suse.com/207635",
            },
            {
               category: "external",
               summary: "SUSE Bug 215623 for CVE-2006-2937",
               url: "https://bugzilla.suse.com/215623",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2006-2937",
      },
      {
         cve: "CVE-2006-2940",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-2940",
            },
         ],
         notes: [
            {
               category: "general",
               text: "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-2940",
               url: "https://www.suse.com/security/cve/CVE-2006-2940",
            },
            {
               category: "external",
               summary: "SUSE Bug 202366 for CVE-2006-2940",
               url: "https://bugzilla.suse.com/202366",
            },
            {
               category: "external",
               summary: "SUSE Bug 207635 for CVE-2006-2940",
               url: "https://bugzilla.suse.com/207635",
            },
            {
               category: "external",
               summary: "SUSE Bug 208971 for CVE-2006-2940",
               url: "https://bugzilla.suse.com/208971",
            },
            {
               category: "external",
               summary: "SUSE Bug 215623 for CVE-2006-2940",
               url: "https://bugzilla.suse.com/215623",
            },
            {
               category: "external",
               summary: "SUSE Bug 223040 for CVE-2006-2940",
               url: "https://bugzilla.suse.com/223040",
            },
            {
               category: "external",
               summary: "SUSE Bug 992991 for CVE-2006-2940",
               url: "https://bugzilla.suse.com/992991",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2006-2940",
      },
      {
         cve: "CVE-2006-3738",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-3738",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-3738",
               url: "https://www.suse.com/security/cve/CVE-2006-3738",
            },
            {
               category: "external",
               summary: "SUSE Bug 202366 for CVE-2006-3738",
               url: "https://bugzilla.suse.com/202366",
            },
            {
               category: "external",
               summary: "SUSE Bug 215623 for CVE-2006-3738",
               url: "https://bugzilla.suse.com/215623",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "critical",
            },
         ],
         title: "CVE-2006-3738",
      },
      {
         cve: "CVE-2006-4339",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-4339",
            },
         ],
         notes: [
            {
               category: "general",
               text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-4339",
               url: "https://www.suse.com/security/cve/CVE-2006-4339",
            },
            {
               category: "external",
               summary: "SUSE Bug 202366 for CVE-2006-4339",
               url: "https://bugzilla.suse.com/202366",
            },
            {
               category: "external",
               summary: "SUSE Bug 203595 for CVE-2006-4339",
               url: "https://bugzilla.suse.com/203595",
            },
            {
               category: "external",
               summary: "SUSE Bug 206636 for CVE-2006-4339",
               url: "https://bugzilla.suse.com/206636",
            },
            {
               category: "external",
               summary: "SUSE Bug 207635 for CVE-2006-4339",
               url: "https://bugzilla.suse.com/207635",
            },
            {
               category: "external",
               summary: "SUSE Bug 215623 for CVE-2006-4339",
               url: "https://bugzilla.suse.com/215623",
            },
            {
               category: "external",
               summary: "SUSE Bug 218303 for CVE-2006-4339",
               url: "https://bugzilla.suse.com/218303",
            },
            {
               category: "external",
               summary: "SUSE Bug 233584 for CVE-2006-4339",
               url: "https://bugzilla.suse.com/233584",
            },
            {
               category: "external",
               summary: "SUSE Bug 564512 for CVE-2006-4339",
               url: "https://bugzilla.suse.com/564512",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2006-4339",
      },
      {
         cve: "CVE-2006-4343",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2006-4343",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2006-4343",
               url: "https://www.suse.com/security/cve/CVE-2006-4343",
            },
            {
               category: "external",
               summary: "SUSE Bug 202366 for CVE-2006-4343",
               url: "https://bugzilla.suse.com/202366",
            },
            {
               category: "external",
               summary: "SUSE Bug 207635 for CVE-2006-4343",
               url: "https://bugzilla.suse.com/207635",
            },
            {
               category: "external",
               summary: "SUSE Bug 215623 for CVE-2006-4343",
               url: "https://bugzilla.suse.com/215623",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2006-4343",
      },
      {
         cve: "CVE-2007-3108",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-3108",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-3108",
               url: "https://www.suse.com/security/cve/CVE-2007-3108",
            },
            {
               category: "external",
               summary: "SUSE Bug 296511 for CVE-2007-3108",
               url: "https://bugzilla.suse.com/296511",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2007-3108",
      },
      {
         cve: "CVE-2007-5135",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2007-5135",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2007-5135",
               url: "https://www.suse.com/security/cve/CVE-2007-5135",
            },
            {
               category: "external",
               summary: "SUSE Bug 329208 for CVE-2007-5135",
               url: "https://bugzilla.suse.com/329208",
            },
            {
               category: "external",
               summary: "SUSE Bug 331726 for CVE-2007-5135",
               url: "https://bugzilla.suse.com/331726",
            },
            {
               category: "external",
               summary: "SUSE Bug 363663 for CVE-2007-5135",
               url: "https://bugzilla.suse.com/363663",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2007-5135",
      },
      {
         cve: "CVE-2008-0891",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2008-0891",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2008-0891",
               url: "https://www.suse.com/security/cve/CVE-2008-0891",
            },
            {
               category: "external",
               summary: "SUSE Bug 394317 for CVE-2008-0891",
               url: "https://bugzilla.suse.com/394317",
            },
            {
               category: "external",
               summary: "SUSE Bug 404511 for CVE-2008-0891",
               url: "https://bugzilla.suse.com/404511",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2008-0891",
      },
      {
         cve: "CVE-2008-1672",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2008-1672",
            },
         ],
         notes: [
            {
               category: "general",
               text: "OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses \"particular cipher suites,\" which triggers a NULL pointer dereference.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2008-1672",
               url: "https://www.suse.com/security/cve/CVE-2008-1672",
            },
            {
               category: "external",
               summary: "SUSE Bug 394317 for CVE-2008-1672",
               url: "https://bugzilla.suse.com/394317",
            },
            {
               category: "external",
               summary: "SUSE Bug 404511 for CVE-2008-1672",
               url: "https://bugzilla.suse.com/404511",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2008-1672",
      },
      {
         cve: "CVE-2016-7055",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2016-7055",
            },
         ],
         notes: [
            {
               category: "general",
               text: "There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2016-7055",
               url: "https://www.suse.com/security/cve/CVE-2016-7055",
            },
            {
               category: "external",
               summary: "SUSE Bug 1009528 for CVE-2016-7055",
               url: "https://bugzilla.suse.com/1009528",
            },
            {
               category: "external",
               summary: "SUSE Bug 1021641 for CVE-2016-7055",
               url: "https://bugzilla.suse.com/1021641",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2016-7055",
      },
      {
         cve: "CVE-2016-7056",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2016-7056",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2016-7056",
               url: "https://www.suse.com/security/cve/CVE-2016-7056",
            },
            {
               category: "external",
               summary: "SUSE Bug 1005878 for CVE-2016-7056",
               url: "https://bugzilla.suse.com/1005878",
            },
            {
               category: "external",
               summary: "SUSE Bug 1019334 for CVE-2016-7056",
               url: "https://bugzilla.suse.com/1019334",
            },
            {
               category: "external",
               summary: "SUSE Bug 1148697 for CVE-2016-7056",
               url: "https://bugzilla.suse.com/1148697",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2016-7056",
      },
      {
         cve: "CVE-2017-3731",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-3731",
            },
         ],
         notes: [
            {
               category: "general",
               text: "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-3731",
               url: "https://www.suse.com/security/cve/CVE-2017-3731",
            },
            {
               category: "external",
               summary: "SUSE Bug 1021641 for CVE-2017-3731",
               url: "https://bugzilla.suse.com/1021641",
            },
            {
               category: "external",
               summary: "SUSE Bug 1022085 for CVE-2017-3731",
               url: "https://bugzilla.suse.com/1022085",
            },
            {
               category: "external",
               summary: "SUSE Bug 1064118 for CVE-2017-3731",
               url: "https://bugzilla.suse.com/1064118",
            },
            {
               category: "external",
               summary: "SUSE Bug 1064119 for CVE-2017-3731",
               url: "https://bugzilla.suse.com/1064119",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-3731",
      },
      {
         cve: "CVE-2017-3732",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-3732",
            },
         ],
         notes: [
            {
               category: "general",
               text: "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
               "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-3732",
               url: "https://www.suse.com/security/cve/CVE-2017-3732",
            },
            {
               category: "external",
               summary: "SUSE Bug 1021641 for CVE-2017-3732",
               url: "https://bugzilla.suse.com/1021641",
            },
            {
               category: "external",
               summary: "SUSE Bug 1022086 for CVE-2017-3732",
               url: "https://bugzilla.suse.com/1022086",
            },
            {
               category: "external",
               summary: "SUSE Bug 1049418 for CVE-2017-3732",
               url: "https://bugzilla.suse.com/1049418",
            },
            {
               category: "external",
               summary: "SUSE Bug 1049421 for CVE-2017-3732",
               url: "https://bugzilla.suse.com/1049421",
            },
            {
               category: "external",
               summary: "SUSE Bug 1049422 for CVE-2017-3732",
               url: "https://bugzilla.suse.com/1049422",
            },
            {
               category: "external",
               summary: "SUSE Bug 1066242 for CVE-2017-3732",
               url: "https://bugzilla.suse.com/1066242",
            },
            {
               category: "external",
               summary: "SUSE Bug 1071906 for CVE-2017-3732",
               url: "https://bugzilla.suse.com/1071906",
            },
            {
               category: "external",
               summary: "SUSE Bug 957814 for CVE-2017-3732",
               url: "https://bugzilla.suse.com/957814",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2.x86_64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.aarch64",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.ppc64le",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.s390x",
                  "openSUSE Tumbleweed:openssl-1.1.1l-1.2.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2017-3732",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.