Vulnerability from csaf_suse
Published
2014-10-22 23:22
Modified
2014-10-22 23:22
Summary
Security update for openssl1

Notes

Title of the patch
Security update for openssl1
Description of the patch
This OpenSSL update fixes the following issues: * SRTP Memory Leak (CVE-2014-3513) * Session Ticket Memory Leak (CVE-2014-3567) * Build option no-ssl3 is incomplete (CVE-2014-3568) * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE) Security Issues: * CVE-2014-3513 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513> * CVE-2014-3567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567> * CVE-2014-3566 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566> * CVE-2014-3568 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>
Patchnames
secsp3-libopenssl1-devel
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for openssl1",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "\nThis OpenSSL update fixes the following issues:\n\n    * SRTP Memory Leak (CVE-2014-3513)\n    * Session Ticket Memory Leak (CVE-2014-3567)\n    * Build option no-ssl3 is incomplete (CVE-2014-3568)\n    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)\n\nSecurity Issues:\n\n    * CVE-2014-3513\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513>\n    * CVE-2014-3567\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567>\n    * CVE-2014-3566\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566>\n    * CVE-2014-3568\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>\n\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "secsp3-libopenssl1-devel",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1185-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2015:1185-1",
            url: "https://www.suse.com/support/update/announcement/2015/suse-su-20151185-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2015:1185-1",
            url: "https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 860332",
            url: "https://bugzilla.suse.com/860332",
         },
         {
            category: "self",
            summary: "SUSE Bug 861014",
            url: "https://bugzilla.suse.com/861014",
         },
         {
            category: "self",
            summary: "SUSE Bug 864912",
            url: "https://bugzilla.suse.com/864912",
         },
         {
            category: "self",
            summary: "SUSE Bug 869945",
            url: "https://bugzilla.suse.com/869945",
         },
         {
            category: "self",
            summary: "SUSE Bug 872299",
            url: "https://bugzilla.suse.com/872299",
         },
         {
            category: "self",
            summary: "SUSE Bug 873351",
            url: "https://bugzilla.suse.com/873351",
         },
         {
            category: "self",
            summary: "SUSE Bug 876282",
            url: "https://bugzilla.suse.com/876282",
         },
         {
            category: "self",
            summary: "SUSE Bug 880891",
            url: "https://bugzilla.suse.com/880891",
         },
         {
            category: "self",
            summary: "SUSE Bug 889812",
            url: "https://bugzilla.suse.com/889812",
         },
         {
            category: "self",
            summary: "SUSE Bug 890764",
            url: "https://bugzilla.suse.com/890764",
         },
         {
            category: "self",
            summary: "SUSE Bug 890767",
            url: "https://bugzilla.suse.com/890767",
         },
         {
            category: "self",
            summary: "SUSE Bug 890768",
            url: "https://bugzilla.suse.com/890768",
         },
         {
            category: "self",
            summary: "SUSE Bug 890769",
            url: "https://bugzilla.suse.com/890769",
         },
         {
            category: "self",
            summary: "SUSE Bug 890770",
            url: "https://bugzilla.suse.com/890770",
         },
         {
            category: "self",
            summary: "SUSE Bug 901223",
            url: "https://bugzilla.suse.com/901223",
         },
         {
            category: "self",
            summary: "SUSE Bug 901277",
            url: "https://bugzilla.suse.com/901277",
         },
         {
            category: "self",
            summary: "SUSE Bug 906878",
            url: "https://bugzilla.suse.com/906878",
         },
         {
            category: "self",
            summary: "SUSE Bug 912014",
            url: "https://bugzilla.suse.com/912014",
         },
         {
            category: "self",
            summary: "SUSE Bug 912015",
            url: "https://bugzilla.suse.com/912015",
         },
         {
            category: "self",
            summary: "SUSE Bug 912018",
            url: "https://bugzilla.suse.com/912018",
         },
         {
            category: "self",
            summary: "SUSE Bug 912292",
            url: "https://bugzilla.suse.com/912292",
         },
         {
            category: "self",
            summary: "SUSE Bug 912293",
            url: "https://bugzilla.suse.com/912293",
         },
         {
            category: "self",
            summary: "SUSE Bug 912294",
            url: "https://bugzilla.suse.com/912294",
         },
         {
            category: "self",
            summary: "SUSE Bug 912296",
            url: "https://bugzilla.suse.com/912296",
         },
         {
            category: "self",
            summary: "SUSE Bug 919648",
            url: "https://bugzilla.suse.com/919648",
         },
         {
            category: "self",
            summary: "SUSE Bug 920236",
            url: "https://bugzilla.suse.com/920236",
         },
         {
            category: "self",
            summary: "SUSE Bug 922488",
            url: "https://bugzilla.suse.com/922488",
         },
         {
            category: "self",
            summary: "SUSE Bug 922496",
            url: "https://bugzilla.suse.com/922496",
         },
         {
            category: "self",
            summary: "SUSE Bug 922499",
            url: "https://bugzilla.suse.com/922499",
         },
         {
            category: "self",
            summary: "SUSE Bug 922500",
            url: "https://bugzilla.suse.com/922500",
         },
         {
            category: "self",
            summary: "SUSE Bug 922501",
            url: "https://bugzilla.suse.com/922501",
         },
         {
            category: "self",
            summary: "SUSE Bug 923384",
            url: "https://bugzilla.suse.com/923384",
         },
         {
            category: "self",
            summary: "SUSE Bug 929678",
            url: "https://bugzilla.suse.com/929678",
         },
         {
            category: "self",
            summary: "SUSE Bug 931698",
            url: "https://bugzilla.suse.com/931698",
         },
         {
            category: "self",
            summary: "SUSE Bug 933911",
            url: "https://bugzilla.suse.com/933911",
         },
         {
            category: "self",
            summary: "SUSE Bug 934487",
            url: "https://bugzilla.suse.com/934487",
         },
         {
            category: "self",
            summary: "SUSE Bug 934489",
            url: "https://bugzilla.suse.com/934489",
         },
         {
            category: "self",
            summary: "SUSE Bug 934491",
            url: "https://bugzilla.suse.com/934491",
         },
         {
            category: "self",
            summary: "SUSE Bug 934493",
            url: "https://bugzilla.suse.com/934493",
         },
         {
            category: "self",
            summary: "SUSE Bug 934494",
            url: "https://bugzilla.suse.com/934494",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2010-5298 page",
            url: "https://www.suse.com/security/cve/CVE-2010-5298/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-0160 page",
            url: "https://www.suse.com/security/cve/CVE-2014-0160/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-0195 page",
            url: "https://www.suse.com/security/cve/CVE-2014-0195/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-0198 page",
            url: "https://www.suse.com/security/cve/CVE-2014-0198/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-0221 page",
            url: "https://www.suse.com/security/cve/CVE-2014-0221/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-0224 page",
            url: "https://www.suse.com/security/cve/CVE-2014-0224/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3470 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3470/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3505 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3505/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3506 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3506/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3507 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3507/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3508 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3508/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3509 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3509/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3510 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3510/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3511 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3511/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3512 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3512/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3513 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3513/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3566 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3566/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3567 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3567/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3568 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3568/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3570 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3570/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3571 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3571/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-3572 page",
            url: "https://www.suse.com/security/cve/CVE-2014-3572/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-5139 page",
            url: "https://www.suse.com/security/cve/CVE-2014-5139/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-8176 page",
            url: "https://www.suse.com/security/cve/CVE-2014-8176/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2014-8275 page",
            url: "https://www.suse.com/security/cve/CVE-2014-8275/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0204 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0204/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0205 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0205/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0206 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0206/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0209 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0209/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0286 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0286/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0287 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0287/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0288 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0288/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0289 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0289/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0292 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0292/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-0293 page",
            url: "https://www.suse.com/security/cve/CVE-2015-0293/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-1788 page",
            url: "https://www.suse.com/security/cve/CVE-2015-1788/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-1789 page",
            url: "https://www.suse.com/security/cve/CVE-2015-1789/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-1790 page",
            url: "https://www.suse.com/security/cve/CVE-2015-1790/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-1791 page",
            url: "https://www.suse.com/security/cve/CVE-2015-1791/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-1792 page",
            url: "https://www.suse.com/security/cve/CVE-2015-1792/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2015-4000 page",
            url: "https://www.suse.com/security/cve/CVE-2015-4000/",
         },
      ],
      title: "Security update for openssl1",
      tracking: {
         current_release_date: "2014-10-22T23:22:56Z",
         generator: {
            date: "2014-10-22T23:22:56Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2015:1185-1",
         initial_release_date: "2014-10-22T23:22:56Z",
         revision_history: [
            {
               date: "2014-10-22T23:22:56Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl1-devel-1.0.1g-0.22.1.i586",
                        product: {
                           name: "libopenssl1-devel-1.0.1g-0.22.1.i586",
                           product_id: "libopenssl1-devel-1.0.1g-0.22.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-1.0.1g-0.22.1.i586",
                        product: {
                           name: "libopenssl1_0_0-1.0.1g-0.22.1.i586",
                           product_id: "libopenssl1_0_0-1.0.1g-0.22.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-1.0.1g-0.22.1.i586",
                        product: {
                           name: "openssl1-1.0.1g-0.22.1.i586",
                           product_id: "openssl1-1.0.1g-0.22.1.i586",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-doc-1.0.1g-0.22.1.i586",
                        product: {
                           name: "openssl1-doc-1.0.1g-0.22.1.i586",
                           product_id: "openssl1-doc-1.0.1g-0.22.1.i586",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "i586",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl1-devel-1.0.1g-0.22.1.ia64",
                        product: {
                           name: "libopenssl1-devel-1.0.1g-0.22.1.ia64",
                           product_id: "libopenssl1-devel-1.0.1g-0.22.1.ia64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                        product: {
                           name: "libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                           product_id: "libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                        product: {
                           name: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                           product_id: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-1.0.1g-0.22.1.ia64",
                        product: {
                           name: "openssl1-1.0.1g-0.22.1.ia64",
                           product_id: "openssl1-1.0.1g-0.22.1.ia64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-doc-1.0.1g-0.22.1.ia64",
                        product: {
                           name: "openssl1-doc-1.0.1g-0.22.1.ia64",
                           product_id: "openssl1-doc-1.0.1g-0.22.1.ia64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ia64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                        product: {
                           name: "libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                           product_id: "libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                        product: {
                           name: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                           product_id: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                        product: {
                           name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                           product_id: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-1.0.1g-0.22.1.ppc64",
                        product: {
                           name: "openssl1-1.0.1g-0.22.1.ppc64",
                           product_id: "openssl1-1.0.1g-0.22.1.ppc64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-doc-1.0.1g-0.22.1.ppc64",
                        product: {
                           name: "openssl1-doc-1.0.1g-0.22.1.ppc64",
                           product_id: "openssl1-doc-1.0.1g-0.22.1.ppc64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl1-devel-1.0.1g-0.22.1.s390x",
                        product: {
                           name: "libopenssl1-devel-1.0.1g-0.22.1.s390x",
                           product_id: "libopenssl1-devel-1.0.1g-0.22.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                        product: {
                           name: "libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                           product_id: "libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                        product: {
                           name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                           product_id: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-1.0.1g-0.22.1.s390x",
                        product: {
                           name: "openssl1-1.0.1g-0.22.1.s390x",
                           product_id: "openssl1-1.0.1g-0.22.1.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-doc-1.0.1g-0.22.1.s390x",
                        product: {
                           name: "openssl1-doc-1.0.1g-0.22.1.s390x",
                           product_id: "openssl1-doc-1.0.1g-0.22.1.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                        product: {
                           name: "libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                           product_id: "libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                        product: {
                           name: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                           product_id: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                        product: {
                           name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                           product_id: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-1.0.1g-0.22.1.x86_64",
                        product: {
                           name: "openssl1-1.0.1g-0.22.1.x86_64",
                           product_id: "openssl1-1.0.1g-0.22.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "openssl1-doc-1.0.1g-0.22.1.x86_64",
                        product: {
                           name: "openssl1-doc-1.0.1g-0.22.1.x86_64",
                           product_id: "openssl1-doc-1.0.1g-0.22.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Server 11-SECURITY",
                        product: {
                           name: "SUSE Linux Enterprise Server 11-SECURITY",
                           product_id: "SUSE Linux Enterprise Server 11-SECURITY",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sles:11:security",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1-devel-1.0.1g-0.22.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
            },
            product_reference: "libopenssl1-devel-1.0.1g-0.22.1.i586",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1-devel-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
            },
            product_reference: "libopenssl1-devel-1.0.1g-0.22.1.ia64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1-devel-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
            },
            product_reference: "libopenssl1-devel-1.0.1g-0.22.1.ppc64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1-devel-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
            },
            product_reference: "libopenssl1-devel-1.0.1g-0.22.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1-devel-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
            },
            product_reference: "libopenssl1-devel-1.0.1g-0.22.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-1.0.1g-0.22.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
            },
            product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.i586",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
            },
            product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.ia64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
            },
            product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
            },
            product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
            },
            product_reference: "libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
            },
            product_reference: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
            },
            product_reference: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
            },
            product_reference: "libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
            },
            product_reference: "libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-1.0.1g-0.22.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
            },
            product_reference: "openssl1-1.0.1g-0.22.1.i586",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
            },
            product_reference: "openssl1-1.0.1g-0.22.1.ia64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
            },
            product_reference: "openssl1-1.0.1g-0.22.1.ppc64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
            },
            product_reference: "openssl1-1.0.1g-0.22.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
            },
            product_reference: "openssl1-1.0.1g-0.22.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-doc-1.0.1g-0.22.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
            },
            product_reference: "openssl1-doc-1.0.1g-0.22.1.i586",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-doc-1.0.1g-0.22.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
            },
            product_reference: "openssl1-doc-1.0.1g-0.22.1.ia64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-doc-1.0.1g-0.22.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
            },
            product_reference: "openssl1-doc-1.0.1g-0.22.1.ppc64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-doc-1.0.1g-0.22.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
            },
            product_reference: "openssl1-doc-1.0.1g-0.22.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "openssl1-doc-1.0.1g-0.22.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY",
               product_id: "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            },
            product_reference: "openssl1-doc-1.0.1g-0.22.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 11-SECURITY",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2010-5298",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2010-5298",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2010-5298",
               url: "https://www.suse.com/security/cve/CVE-2010-5298",
            },
            {
               category: "external",
               summary: "SUSE Bug 873351 for CVE-2010-5298",
               url: "https://bugzilla.suse.com/873351",
            },
            {
               category: "external",
               summary: "SUSE Bug 880891 for CVE-2010-5298",
               url: "https://bugzilla.suse.com/880891",
            },
            {
               category: "external",
               summary: "SUSE Bug 883126 for CVE-2010-5298",
               url: "https://bugzilla.suse.com/883126",
            },
            {
               category: "external",
               summary: "SUSE Bug 885777 for CVE-2010-5298",
               url: "https://bugzilla.suse.com/885777",
            },
            {
               category: "external",
               summary: "SUSE Bug 915913 for CVE-2010-5298",
               url: "https://bugzilla.suse.com/915913",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "low",
            },
         ],
         title: "CVE-2010-5298",
      },
      {
         cve: "CVE-2014-0160",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-0160",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-0160",
               url: "https://www.suse.com/security/cve/CVE-2014-0160",
            },
            {
               category: "external",
               summary: "SUSE Bug 872299 for CVE-2014-0160",
               url: "https://bugzilla.suse.com/872299",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-0160",
      },
      {
         cve: "CVE-2014-0195",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-0195",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-0195",
               url: "https://www.suse.com/security/cve/CVE-2014-0195",
            },
            {
               category: "external",
               summary: "SUSE Bug 880891 for CVE-2014-0195",
               url: "https://bugzilla.suse.com/880891",
            },
            {
               category: "external",
               summary: "SUSE Bug 885777 for CVE-2014-0195",
               url: "https://bugzilla.suse.com/885777",
            },
            {
               category: "external",
               summary: "SUSE Bug 915913 for CVE-2014-0195",
               url: "https://bugzilla.suse.com/915913",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-0195",
      },
      {
         cve: "CVE-2014-0198",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-0198",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-0198",
               url: "https://www.suse.com/security/cve/CVE-2014-0198",
            },
            {
               category: "external",
               summary: "SUSE Bug 876282 for CVE-2014-0198",
               url: "https://bugzilla.suse.com/876282",
            },
            {
               category: "external",
               summary: "SUSE Bug 880891 for CVE-2014-0198",
               url: "https://bugzilla.suse.com/880891",
            },
            {
               category: "external",
               summary: "SUSE Bug 885777 for CVE-2014-0198",
               url: "https://bugzilla.suse.com/885777",
            },
            {
               category: "external",
               summary: "SUSE Bug 915913 for CVE-2014-0198",
               url: "https://bugzilla.suse.com/915913",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-0198",
      },
      {
         cve: "CVE-2014-0221",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-0221",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-0221",
               url: "https://www.suse.com/security/cve/CVE-2014-0221",
            },
            {
               category: "external",
               summary: "SUSE Bug 880891 for CVE-2014-0221",
               url: "https://bugzilla.suse.com/880891",
            },
            {
               category: "external",
               summary: "SUSE Bug 883126 for CVE-2014-0221",
               url: "https://bugzilla.suse.com/883126",
            },
            {
               category: "external",
               summary: "SUSE Bug 885777 for CVE-2014-0221",
               url: "https://bugzilla.suse.com/885777",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-0221",
               url: "https://bugzilla.suse.com/905106",
            },
            {
               category: "external",
               summary: "SUSE Bug 915913 for CVE-2014-0221",
               url: "https://bugzilla.suse.com/915913",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-0221",
      },
      {
         cve: "CVE-2014-0224",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-0224",
            },
         ],
         notes: [
            {
               category: "general",
               text: "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-0224",
               url: "https://www.suse.com/security/cve/CVE-2014-0224",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146657 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/1146657",
            },
            {
               category: "external",
               summary: "SUSE Bug 880891 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/880891",
            },
            {
               category: "external",
               summary: "SUSE Bug 881743 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/881743",
            },
            {
               category: "external",
               summary: "SUSE Bug 883126 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/883126",
            },
            {
               category: "external",
               summary: "SUSE Bug 885777 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/885777",
            },
            {
               category: "external",
               summary: "SUSE Bug 892403 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/892403",
            },
            {
               category: "external",
               summary: "SUSE Bug 901237 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/901237",
            },
            {
               category: "external",
               summary: "SUSE Bug 903703 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/903703",
            },
            {
               category: "external",
               summary: "SUSE Bug 905018 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/905018",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/905106",
            },
            {
               category: "external",
               summary: "SUSE Bug 914447 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/914447",
            },
            {
               category: "external",
               summary: "SUSE Bug 915913 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/915913",
            },
            {
               category: "external",
               summary: "SUSE Bug 916239 for CVE-2014-0224",
               url: "https://bugzilla.suse.com/916239",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-0224",
      },
      {
         cve: "CVE-2014-3470",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3470",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3470",
               url: "https://www.suse.com/security/cve/CVE-2014-3470",
            },
            {
               category: "external",
               summary: "SUSE Bug 880891 for CVE-2014-3470",
               url: "https://bugzilla.suse.com/880891",
            },
            {
               category: "external",
               summary: "SUSE Bug 883126 for CVE-2014-3470",
               url: "https://bugzilla.suse.com/883126",
            },
            {
               category: "external",
               summary: "SUSE Bug 885777 for CVE-2014-3470",
               url: "https://bugzilla.suse.com/885777",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3470",
               url: "https://bugzilla.suse.com/905106",
            },
            {
               category: "external",
               summary: "SUSE Bug 915913 for CVE-2014-3470",
               url: "https://bugzilla.suse.com/915913",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-3470",
      },
      {
         cve: "CVE-2014-3505",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3505",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3505",
               url: "https://www.suse.com/security/cve/CVE-2014-3505",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-3505",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890764 for CVE-2014-3505",
               url: "https://bugzilla.suse.com/890764",
            },
            {
               category: "external",
               summary: "SUSE Bug 890767 for CVE-2014-3505",
               url: "https://bugzilla.suse.com/890767",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3505",
               url: "https://bugzilla.suse.com/905106",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3505",
      },
      {
         cve: "CVE-2014-3506",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3506",
            },
         ],
         notes: [
            {
               category: "general",
               text: "d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3506",
               url: "https://www.suse.com/security/cve/CVE-2014-3506",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-3506",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890764 for CVE-2014-3506",
               url: "https://bugzilla.suse.com/890764",
            },
            {
               category: "external",
               summary: "SUSE Bug 890768 for CVE-2014-3506",
               url: "https://bugzilla.suse.com/890768",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3506",
               url: "https://bugzilla.suse.com/905106",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3506",
      },
      {
         cve: "CVE-2014-3507",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3507",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3507",
               url: "https://www.suse.com/security/cve/CVE-2014-3507",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-3507",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890764 for CVE-2014-3507",
               url: "https://bugzilla.suse.com/890764",
            },
            {
               category: "external",
               summary: "SUSE Bug 890769 for CVE-2014-3507",
               url: "https://bugzilla.suse.com/890769",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3507",
               url: "https://bugzilla.suse.com/905106",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3507",
      },
      {
         cve: "CVE-2014-3508",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3508",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3508",
               url: "https://www.suse.com/security/cve/CVE-2014-3508",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-3508",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890764 for CVE-2014-3508",
               url: "https://bugzilla.suse.com/890764",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3508",
               url: "https://bugzilla.suse.com/905106",
            },
            {
               category: "external",
               summary: "SUSE Bug 950708 for CVE-2014-3508",
               url: "https://bugzilla.suse.com/950708",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3508",
      },
      {
         cve: "CVE-2014-3509",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3509",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3509",
               url: "https://www.suse.com/security/cve/CVE-2014-3509",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-3509",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890766 for CVE-2014-3509",
               url: "https://bugzilla.suse.com/890766",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3509",
      },
      {
         cve: "CVE-2014-3510",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3510",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3510",
               url: "https://www.suse.com/security/cve/CVE-2014-3510",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-3510",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890764 for CVE-2014-3510",
               url: "https://bugzilla.suse.com/890764",
            },
            {
               category: "external",
               summary: "SUSE Bug 890770 for CVE-2014-3510",
               url: "https://bugzilla.suse.com/890770",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3510",
               url: "https://bugzilla.suse.com/905106",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3510",
      },
      {
         cve: "CVE-2014-3511",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3511",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a \"protocol downgrade\" issue.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3511",
               url: "https://www.suse.com/security/cve/CVE-2014-3511",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-3511",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890771 for CVE-2014-3511",
               url: "https://bugzilla.suse.com/890771",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3511",
      },
      {
         cve: "CVE-2014-3512",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3512",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3512",
               url: "https://www.suse.com/security/cve/CVE-2014-3512",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-3512",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890772 for CVE-2014-3512",
               url: "https://bugzilla.suse.com/890772",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3512",
      },
      {
         cve: "CVE-2014-3513",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3513",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3513",
               url: "https://www.suse.com/security/cve/CVE-2014-3513",
            },
            {
               category: "external",
               summary: "SUSE Bug 901277 for CVE-2014-3513",
               url: "https://bugzilla.suse.com/901277",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-3513",
      },
      {
         cve: "CVE-2014-3566",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3566",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3566",
               url: "https://www.suse.com/security/cve/CVE-2014-3566",
            },
            {
               category: "external",
               summary: "SUSE Bug 1011293 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/1011293",
            },
            {
               category: "external",
               summary: "SUSE Bug 1031023 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/1031023",
            },
            {
               category: "external",
               summary: "SUSE Bug 901223 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/901223",
            },
            {
               category: "external",
               summary: "SUSE Bug 901254 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/901254",
            },
            {
               category: "external",
               summary: "SUSE Bug 901277 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/901277",
            },
            {
               category: "external",
               summary: "SUSE Bug 901748 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/901748",
            },
            {
               category: "external",
               summary: "SUSE Bug 901757 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/901757",
            },
            {
               category: "external",
               summary: "SUSE Bug 901759 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/901759",
            },
            {
               category: "external",
               summary: "SUSE Bug 901889 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/901889",
            },
            {
               category: "external",
               summary: "SUSE Bug 901968 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/901968",
            },
            {
               category: "external",
               summary: "SUSE Bug 902229 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/902229",
            },
            {
               category: "external",
               summary: "SUSE Bug 902233 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/902233",
            },
            {
               category: "external",
               summary: "SUSE Bug 902476 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/902476",
            },
            {
               category: "external",
               summary: "SUSE Bug 903405 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/903405",
            },
            {
               category: "external",
               summary: "SUSE Bug 903684 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/903684",
            },
            {
               category: "external",
               summary: "SUSE Bug 904889 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/904889",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/905106",
            },
            {
               category: "external",
               summary: "SUSE Bug 914041 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/914041",
            },
            {
               category: "external",
               summary: "SUSE Bug 994144 for CVE-2014-3566",
               url: "https://bugzilla.suse.com/994144",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.4,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2014-3566",
      },
      {
         cve: "CVE-2014-3567",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3567",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3567",
               url: "https://www.suse.com/security/cve/CVE-2014-3567",
            },
            {
               category: "external",
               summary: "SUSE Bug 877506 for CVE-2014-3567",
               url: "https://bugzilla.suse.com/877506",
            },
            {
               category: "external",
               summary: "SUSE Bug 901277 for CVE-2014-3567",
               url: "https://bugzilla.suse.com/901277",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3567",
               url: "https://bugzilla.suse.com/905106",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-3567",
      },
      {
         cve: "CVE-2014-3568",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3568",
            },
         ],
         notes: [
            {
               category: "general",
               text: "OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3568",
               url: "https://www.suse.com/security/cve/CVE-2014-3568",
            },
            {
               category: "external",
               summary: "SUSE Bug 901277 for CVE-2014-3568",
               url: "https://bugzilla.suse.com/901277",
            },
            {
               category: "external",
               summary: "SUSE Bug 905106 for CVE-2014-3568",
               url: "https://bugzilla.suse.com/905106",
            },
            {
               category: "external",
               summary: "SUSE Bug 911399 for CVE-2014-3568",
               url: "https://bugzilla.suse.com/911399",
            },
            {
               category: "external",
               summary: "SUSE Bug 986238 for CVE-2014-3568",
               url: "https://bugzilla.suse.com/986238",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-3568",
      },
      {
         cve: "CVE-2014-3570",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3570",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3570",
               url: "https://www.suse.com/security/cve/CVE-2014-3570",
            },
            {
               category: "external",
               summary: "SUSE Bug 912296 for CVE-2014-3570",
               url: "https://bugzilla.suse.com/912296",
            },
            {
               category: "external",
               summary: "SUSE Bug 915848 for CVE-2014-3570",
               url: "https://bugzilla.suse.com/915848",
            },
            {
               category: "external",
               summary: "SUSE Bug 927623 for CVE-2014-3570",
               url: "https://bugzilla.suse.com/927623",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2014-3570",
               url: "https://bugzilla.suse.com/937891",
            },
            {
               category: "external",
               summary: "SUSE Bug 944456 for CVE-2014-3570",
               url: "https://bugzilla.suse.com/944456",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-3570",
      },
      {
         cve: "CVE-2014-3571",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3571",
            },
         ],
         notes: [
            {
               category: "general",
               text: "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3571",
               url: "https://www.suse.com/security/cve/CVE-2014-3571",
            },
            {
               category: "external",
               summary: "SUSE Bug 912294 for CVE-2014-3571",
               url: "https://bugzilla.suse.com/912294",
            },
            {
               category: "external",
               summary: "SUSE Bug 915848 for CVE-2014-3571",
               url: "https://bugzilla.suse.com/915848",
            },
            {
               category: "external",
               summary: "SUSE Bug 927623 for CVE-2014-3571",
               url: "https://bugzilla.suse.com/927623",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-3571",
      },
      {
         cve: "CVE-2014-3572",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-3572",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-3572",
               url: "https://www.suse.com/security/cve/CVE-2014-3572",
            },
            {
               category: "external",
               summary: "SUSE Bug 912015 for CVE-2014-3572",
               url: "https://bugzilla.suse.com/912015",
            },
            {
               category: "external",
               summary: "SUSE Bug 915848 for CVE-2014-3572",
               url: "https://bugzilla.suse.com/915848",
            },
            {
               category: "external",
               summary: "SUSE Bug 927623 for CVE-2014-3572",
               url: "https://bugzilla.suse.com/927623",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2014-3572",
               url: "https://bugzilla.suse.com/937891",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-3572",
      },
      {
         cve: "CVE-2014-5139",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-5139",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-5139",
               url: "https://www.suse.com/security/cve/CVE-2014-5139",
            },
            {
               category: "external",
               summary: "SUSE Bug 886831 for CVE-2014-5139",
               url: "https://bugzilla.suse.com/886831",
            },
            {
               category: "external",
               summary: "SUSE Bug 890759 for CVE-2014-5139",
               url: "https://bugzilla.suse.com/890759",
            },
            {
               category: "external",
               summary: "SUSE Bug 890765 for CVE-2014-5139",
               url: "https://bugzilla.suse.com/890765",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-5139",
      },
      {
         cve: "CVE-2014-8176",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-8176",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-8176",
               url: "https://www.suse.com/security/cve/CVE-2014-8176",
            },
            {
               category: "external",
               summary: "SUSE Bug 1148697 for CVE-2014-8176",
               url: "https://bugzilla.suse.com/1148697",
            },
            {
               category: "external",
               summary: "SUSE Bug 934494 for CVE-2014-8176",
               url: "https://bugzilla.suse.com/934494",
            },
            {
               category: "external",
               summary: "SUSE Bug 934666 for CVE-2014-8176",
               url: "https://bugzilla.suse.com/934666",
            },
            {
               category: "external",
               summary: "SUSE Bug 986238 for CVE-2014-8176",
               url: "https://bugzilla.suse.com/986238",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2014-8176",
      },
      {
         cve: "CVE-2014-8275",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2014-8275",
            },
         ],
         notes: [
            {
               category: "general",
               text: "OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2014-8275",
               url: "https://www.suse.com/security/cve/CVE-2014-8275",
            },
            {
               category: "external",
               summary: "SUSE Bug 912018 for CVE-2014-8275",
               url: "https://bugzilla.suse.com/912018",
            },
            {
               category: "external",
               summary: "SUSE Bug 915848 for CVE-2014-8275",
               url: "https://bugzilla.suse.com/915848",
            },
            {
               category: "external",
               summary: "SUSE Bug 927623 for CVE-2014-8275",
               url: "https://bugzilla.suse.com/927623",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2014-8275",
               url: "https://bugzilla.suse.com/937891",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2014-8275",
      },
      {
         cve: "CVE-2015-0204",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0204",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the \"FREAK\" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0204",
               url: "https://www.suse.com/security/cve/CVE-2015-0204",
            },
            {
               category: "external",
               summary: "SUSE Bug 912014 for CVE-2015-0204",
               url: "https://bugzilla.suse.com/912014",
            },
            {
               category: "external",
               summary: "SUSE Bug 920482 for CVE-2015-0204",
               url: "https://bugzilla.suse.com/920482",
            },
            {
               category: "external",
               summary: "SUSE Bug 920484 for CVE-2015-0204",
               url: "https://bugzilla.suse.com/920484",
            },
            {
               category: "external",
               summary: "SUSE Bug 927591 for CVE-2015-0204",
               url: "https://bugzilla.suse.com/927591",
            },
            {
               category: "external",
               summary: "SUSE Bug 927623 for CVE-2015-0204",
               url: "https://bugzilla.suse.com/927623",
            },
            {
               category: "external",
               summary: "SUSE Bug 936787 for CVE-2015-0204",
               url: "https://bugzilla.suse.com/936787",
            },
            {
               category: "external",
               summary: "SUSE Bug 952088 for CVE-2015-0204",
               url: "https://bugzilla.suse.com/952088",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2015-0204",
      },
      {
         cve: "CVE-2015-0205",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0205",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0205",
               url: "https://www.suse.com/security/cve/CVE-2015-0205",
            },
            {
               category: "external",
               summary: "SUSE Bug 912293 for CVE-2015-0205",
               url: "https://bugzilla.suse.com/912293",
            },
            {
               category: "external",
               summary: "SUSE Bug 915848 for CVE-2015-0205",
               url: "https://bugzilla.suse.com/915848",
            },
            {
               category: "external",
               summary: "SUSE Bug 927623 for CVE-2015-0205",
               url: "https://bugzilla.suse.com/927623",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-0205",
               url: "https://bugzilla.suse.com/937891",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2015-0205",
      },
      {
         cve: "CVE-2015-0206",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0206",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0206",
               url: "https://www.suse.com/security/cve/CVE-2015-0206",
            },
            {
               category: "external",
               summary: "SUSE Bug 912292 for CVE-2015-0206",
               url: "https://bugzilla.suse.com/912292",
            },
            {
               category: "external",
               summary: "SUSE Bug 927623 for CVE-2015-0206",
               url: "https://bugzilla.suse.com/927623",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-0206",
               url: "https://bugzilla.suse.com/937891",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2015-0206",
      },
      {
         cve: "CVE-2015-0209",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0209",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0209",
               url: "https://www.suse.com/security/cve/CVE-2015-0209",
            },
            {
               category: "external",
               summary: "SUSE Bug 919648 for CVE-2015-0209",
               url: "https://bugzilla.suse.com/919648",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-0209",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-0209",
               url: "https://bugzilla.suse.com/937891",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2015-0209",
      },
      {
         cve: "CVE-2015-0286",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0286",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0286",
               url: "https://www.suse.com/security/cve/CVE-2015-0286",
            },
            {
               category: "external",
               summary: "SUSE Bug 919648 for CVE-2015-0286",
               url: "https://bugzilla.suse.com/919648",
            },
            {
               category: "external",
               summary: "SUSE Bug 922496 for CVE-2015-0286",
               url: "https://bugzilla.suse.com/922496",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-0286",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-0286",
               url: "https://bugzilla.suse.com/937891",
            },
            {
               category: "external",
               summary: "SUSE Bug 951391 for CVE-2015-0286",
               url: "https://bugzilla.suse.com/951391",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2015-0286",
      },
      {
         cve: "CVE-2015-0287",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0287",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0287",
               url: "https://www.suse.com/security/cve/CVE-2015-0287",
            },
            {
               category: "external",
               summary: "SUSE Bug 919648 for CVE-2015-0287",
               url: "https://bugzilla.suse.com/919648",
            },
            {
               category: "external",
               summary: "SUSE Bug 922499 for CVE-2015-0287",
               url: "https://bugzilla.suse.com/922499",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-0287",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-0287",
               url: "https://bugzilla.suse.com/937891",
            },
            {
               category: "external",
               summary: "SUSE Bug 968888 for CVE-2015-0287",
               url: "https://bugzilla.suse.com/968888",
            },
            {
               category: "external",
               summary: "SUSE Bug 991722 for CVE-2015-0287",
               url: "https://bugzilla.suse.com/991722",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2015-0287",
      },
      {
         cve: "CVE-2015-0288",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0288",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0288",
               url: "https://www.suse.com/security/cve/CVE-2015-0288",
            },
            {
               category: "external",
               summary: "SUSE Bug 919648 for CVE-2015-0288",
               url: "https://bugzilla.suse.com/919648",
            },
            {
               category: "external",
               summary: "SUSE Bug 920236 for CVE-2015-0288",
               url: "https://bugzilla.suse.com/920236",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-0288",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-0288",
               url: "https://bugzilla.suse.com/937891",
            },
            {
               category: "external",
               summary: "SUSE Bug 951391 for CVE-2015-0288",
               url: "https://bugzilla.suse.com/951391",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2015-0288",
      },
      {
         cve: "CVE-2015-0289",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0289",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0289",
               url: "https://www.suse.com/security/cve/CVE-2015-0289",
            },
            {
               category: "external",
               summary: "SUSE Bug 919648 for CVE-2015-0289",
               url: "https://bugzilla.suse.com/919648",
            },
            {
               category: "external",
               summary: "SUSE Bug 922500 for CVE-2015-0289",
               url: "https://bugzilla.suse.com/922500",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-0289",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-0289",
               url: "https://bugzilla.suse.com/937891",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2015-0289",
      },
      {
         cve: "CVE-2015-0292",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0292",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0292",
               url: "https://www.suse.com/security/cve/CVE-2015-0292",
            },
            {
               category: "external",
               summary: "SUSE Bug 919648 for CVE-2015-0292",
               url: "https://bugzilla.suse.com/919648",
            },
            {
               category: "external",
               summary: "SUSE Bug 922501 for CVE-2015-0292",
               url: "https://bugzilla.suse.com/922501",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-0292",
               url: "https://bugzilla.suse.com/936586",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2015-0292",
      },
      {
         cve: "CVE-2015-0293",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-0293",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-0293",
               url: "https://www.suse.com/security/cve/CVE-2015-0293",
            },
            {
               category: "external",
               summary: "SUSE Bug 919648 for CVE-2015-0293",
               url: "https://bugzilla.suse.com/919648",
            },
            {
               category: "external",
               summary: "SUSE Bug 922488 for CVE-2015-0293",
               url: "https://bugzilla.suse.com/922488",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-0293",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 968044 for CVE-2015-0293",
               url: "https://bugzilla.suse.com/968044",
            },
            {
               category: "external",
               summary: "SUSE Bug 968051 for CVE-2015-0293",
               url: "https://bugzilla.suse.com/968051",
            },
            {
               category: "external",
               summary: "SUSE Bug 968053 for CVE-2015-0293",
               url: "https://bugzilla.suse.com/968053",
            },
            {
               category: "external",
               summary: "SUSE Bug 986238 for CVE-2015-0293",
               url: "https://bugzilla.suse.com/986238",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "critical",
            },
         ],
         title: "CVE-2015-0293",
      },
      {
         cve: "CVE-2015-1788",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-1788",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-1788",
               url: "https://www.suse.com/security/cve/CVE-2015-1788",
            },
            {
               category: "external",
               summary: "SUSE Bug 934487 for CVE-2015-1788",
               url: "https://bugzilla.suse.com/934487",
            },
            {
               category: "external",
               summary: "SUSE Bug 934666 for CVE-2015-1788",
               url: "https://bugzilla.suse.com/934666",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-1788",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-1788",
               url: "https://bugzilla.suse.com/937891",
            },
            {
               category: "external",
               summary: "SUSE Bug 938432 for CVE-2015-1788",
               url: "https://bugzilla.suse.com/938432",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2015-1788",
      },
      {
         cve: "CVE-2015-1789",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-1789",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-1789",
               url: "https://www.suse.com/security/cve/CVE-2015-1789",
            },
            {
               category: "external",
               summary: "SUSE Bug 934489 for CVE-2015-1789",
               url: "https://bugzilla.suse.com/934489",
            },
            {
               category: "external",
               summary: "SUSE Bug 934666 for CVE-2015-1789",
               url: "https://bugzilla.suse.com/934666",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-1789",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-1789",
               url: "https://bugzilla.suse.com/937891",
            },
            {
               category: "external",
               summary: "SUSE Bug 938432 for CVE-2015-1789",
               url: "https://bugzilla.suse.com/938432",
            },
            {
               category: "external",
               summary: "SUSE Bug 951391 for CVE-2015-1789",
               url: "https://bugzilla.suse.com/951391",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2015-1789",
      },
      {
         cve: "CVE-2015-1790",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-1790",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-1790",
               url: "https://www.suse.com/security/cve/CVE-2015-1790",
            },
            {
               category: "external",
               summary: "SUSE Bug 934491 for CVE-2015-1790",
               url: "https://bugzilla.suse.com/934491",
            },
            {
               category: "external",
               summary: "SUSE Bug 934666 for CVE-2015-1790",
               url: "https://bugzilla.suse.com/934666",
            },
            {
               category: "external",
               summary: "SUSE Bug 936586 for CVE-2015-1790",
               url: "https://bugzilla.suse.com/936586",
            },
            {
               category: "external",
               summary: "SUSE Bug 938432 for CVE-2015-1790",
               url: "https://bugzilla.suse.com/938432",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2015-1790",
      },
      {
         cve: "CVE-2015-1791",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-1791",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-1791",
               url: "https://www.suse.com/security/cve/CVE-2015-1791",
            },
            {
               category: "external",
               summary: "SUSE Bug 933911 for CVE-2015-1791",
               url: "https://bugzilla.suse.com/933911",
            },
            {
               category: "external",
               summary: "SUSE Bug 934666 for CVE-2015-1791",
               url: "https://bugzilla.suse.com/934666",
            },
            {
               category: "external",
               summary: "SUSE Bug 986238 for CVE-2015-1791",
               url: "https://bugzilla.suse.com/986238",
            },
            {
               category: "external",
               summary: "SUSE Bug 989464 for CVE-2015-1791",
               url: "https://bugzilla.suse.com/989464",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2015-1791",
      },
      {
         cve: "CVE-2015-1792",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-1792",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-1792",
               url: "https://www.suse.com/security/cve/CVE-2015-1792",
            },
            {
               category: "external",
               summary: "SUSE Bug 934493 for CVE-2015-1792",
               url: "https://bugzilla.suse.com/934493",
            },
            {
               category: "external",
               summary: "SUSE Bug 934666 for CVE-2015-1792",
               url: "https://bugzilla.suse.com/934666",
            },
            {
               category: "external",
               summary: "SUSE Bug 937891 for CVE-2015-1792",
               url: "https://bugzilla.suse.com/937891",
            },
            {
               category: "external",
               summary: "SUSE Bug 986238 for CVE-2015-1792",
               url: "https://bugzilla.suse.com/986238",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "moderate",
            },
         ],
         title: "CVE-2015-1792",
      },
      {
         cve: "CVE-2015-4000",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2015-4000",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
               "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2015-4000",
               url: "https://www.suse.com/security/cve/CVE-2015-4000",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074631 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/1074631",
            },
            {
               category: "external",
               summary: "SUSE Bug 1211968 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/1211968",
            },
            {
               category: "external",
               summary: "SUSE Bug 931600 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/931600",
            },
            {
               category: "external",
               summary: "SUSE Bug 931698 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/931698",
            },
            {
               category: "external",
               summary: "SUSE Bug 931723 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/931723",
            },
            {
               category: "external",
               summary: "SUSE Bug 931845 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/931845",
            },
            {
               category: "external",
               summary: "SUSE Bug 932026 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/932026",
            },
            {
               category: "external",
               summary: "SUSE Bug 932483 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/932483",
            },
            {
               category: "external",
               summary: "SUSE Bug 934789 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/934789",
            },
            {
               category: "external",
               summary: "SUSE Bug 935033 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/935033",
            },
            {
               category: "external",
               summary: "SUSE Bug 935540 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/935540",
            },
            {
               category: "external",
               summary: "SUSE Bug 935979 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/935979",
            },
            {
               category: "external",
               summary: "SUSE Bug 937202 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/937202",
            },
            {
               category: "external",
               summary: "SUSE Bug 937766 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/937766",
            },
            {
               category: "external",
               summary: "SUSE Bug 938248 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/938248",
            },
            {
               category: "external",
               summary: "SUSE Bug 938432 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/938432",
            },
            {
               category: "external",
               summary: "SUSE Bug 938895 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/938895",
            },
            {
               category: "external",
               summary: "SUSE Bug 938905 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/938905",
            },
            {
               category: "external",
               summary: "SUSE Bug 938906 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/938906",
            },
            {
               category: "external",
               summary: "SUSE Bug 938913 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/938913",
            },
            {
               category: "external",
               summary: "SUSE Bug 938945 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/938945",
            },
            {
               category: "external",
               summary: "SUSE Bug 943664 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/943664",
            },
            {
               category: "external",
               summary: "SUSE Bug 944729 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/944729",
            },
            {
               category: "external",
               summary: "SUSE Bug 945582 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/945582",
            },
            {
               category: "external",
               summary: "SUSE Bug 955589 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/955589",
            },
            {
               category: "external",
               summary: "SUSE Bug 980406 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/980406",
            },
            {
               category: "external",
               summary: "SUSE Bug 990592 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/990592",
            },
            {
               category: "external",
               summary: "SUSE Bug 994144 for CVE-2015-4000",
               url: "https://bugzilla.suse.com/994144",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.7,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
                  version: "3.0",
               },
               products: [
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.22.1.x86_64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.i586",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ia64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.ppc64",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.s390x",
                  "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.22.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2014-10-22T23:22:56Z",
               details: "important",
            },
         ],
         title: "CVE-2015-4000",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.