<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libopenssl-devel-1.1.1l-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11125</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libopenssl-devel-1.1.1l-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libopenssl-devel-1.1.1l-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11125</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11125</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-2937/</URL>
      <Description>SUSE CVE CVE-2006-2937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-2940/</URL>
      <Description>SUSE CVE CVE-2006-2940 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-3738/</URL>
      <Description>SUSE CVE CVE-2006-3738 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-4339/</URL>
      <Description>SUSE CVE CVE-2006-4339 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-4343/</URL>
      <Description>SUSE CVE CVE-2006-4343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-3108/</URL>
      <Description>SUSE CVE CVE-2007-3108 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-5135/</URL>
      <Description>SUSE CVE CVE-2007-5135 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0891/</URL>
      <Description>SUSE CVE CVE-2008-0891 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1672/</URL>
      <Description>SUSE CVE CVE-2008-1672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7055/</URL>
      <Description>SUSE CVE CVE-2016-7055 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7056/</URL>
      <Description>SUSE CVE CVE-2016-7056 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3731/</URL>
      <Description>SUSE CVE CVE-2017-3731 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3732/</URL>
      <Description>SUSE CVE CVE-2017-3732 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-devel-1.1.1l-1.2">
      <FullProductName ProductID="libopenssl-devel-1.1.1l-1.2">libopenssl-devel-1.1.1l-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-1.1.1l-1.2">
      <FullProductName ProductID="openssl-1.1.1l-1.2">openssl-1.1.1l-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl-devel-1.1.1l-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2">libopenssl-devel-1.1.1l-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-1.1.1l-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssl-1.1.1l-1.2">openssl-1.1.1l-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.</Note>
    </Notes>
    <CVE>CVE-2006-2937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-2937.html</URL>
        <Description>CVE-2006-2937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/202366</URL>
        <Description>SUSE Bug 202366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/207635</URL>
        <Description>SUSE Bug 207635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/215623</URL>
        <Description>SUSE Bug 215623</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.</Note>
    </Notes>
    <CVE>CVE-2006-2940</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-2940.html</URL>
        <Description>CVE-2006-2940</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/202366</URL>
        <Description>SUSE Bug 202366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/207635</URL>
        <Description>SUSE Bug 207635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/208971</URL>
        <Description>SUSE Bug 208971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/215623</URL>
        <Description>SUSE Bug 215623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/223040</URL>
        <Description>SUSE Bug 223040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.</Note>
    </Notes>
    <CVE>CVE-2006-3738</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-3738.html</URL>
        <Description>CVE-2006-3738</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/202366</URL>
        <Description>SUSE Bug 202366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/215623</URL>
        <Description>SUSE Bug 215623</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.</Note>
    </Notes>
    <CVE>CVE-2006-4339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-4339.html</URL>
        <Description>CVE-2006-4339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/202366</URL>
        <Description>SUSE Bug 202366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/203595</URL>
        <Description>SUSE Bug 203595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/206636</URL>
        <Description>SUSE Bug 206636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/207635</URL>
        <Description>SUSE Bug 207635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/215623</URL>
        <Description>SUSE Bug 215623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/218303</URL>
        <Description>SUSE Bug 218303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/233584</URL>
        <Description>SUSE Bug 233584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/564512</URL>
        <Description>SUSE Bug 564512</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2006-4343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-4343.html</URL>
        <Description>CVE-2006-4343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/202366</URL>
        <Description>SUSE Bug 202366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/207635</URL>
        <Description>SUSE Bug 207635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/215623</URL>
        <Description>SUSE Bug 215623</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.</Note>
    </Notes>
    <CVE>CVE-2007-3108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-3108.html</URL>
        <Description>CVE-2007-3108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/296511</URL>
        <Description>SUSE Bug 296511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.</Note>
    </Notes>
    <CVE>CVE-2007-5135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-5135.html</URL>
        <Description>CVE-2007-5135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/329208</URL>
        <Description>SUSE Bug 329208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/331726</URL>
        <Description>SUSE Bug 331726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/363663</URL>
        <Description>SUSE Bug 363663</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2008-0891</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0891.html</URL>
        <Description>CVE-2008-0891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/394317</URL>
        <Description>SUSE Bug 394317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/404511</URL>
        <Description>SUSE Bug 404511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2008-1672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1672.html</URL>
        <Description>CVE-2008-1672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/394317</URL>
        <Description>SUSE Bug 394317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/404511</URL>
        <Description>SUSE Bug 404511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.</Note>
    </Notes>
    <CVE>CVE-2016-7055</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7055.html</URL>
        <Description>CVE-2016-7055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009528</URL>
        <Description>SUSE Bug 1009528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021641</URL>
        <Description>SUSE Bug 1021641</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.</Note>
    </Notes>
    <CVE>CVE-2016-7056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7056.html</URL>
        <Description>CVE-2016-7056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005878</URL>
        <Description>SUSE Bug 1005878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019334</URL>
        <Description>SUSE Bug 1019334</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148697</URL>
        <Description>SUSE Bug 1148697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.</Note>
    </Notes>
    <CVE>CVE-2017-3731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3731.html</URL>
        <Description>CVE-2017-3731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021641</URL>
        <Description>SUSE Bug 1021641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022085</URL>
        <Description>SUSE Bug 1022085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064118</URL>
        <Description>SUSE Bug 1064118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064119</URL>
        <Description>SUSE Bug 1064119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.</Note>
    </Notes>
    <CVE>CVE-2017-3732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-devel-1.1.1l-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-1.1.1l-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3732.html</URL>
        <Description>CVE-2017-3732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021641</URL>
        <Description>SUSE Bug 1021641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022086</URL>
        <Description>SUSE Bug 1022086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049418</URL>
        <Description>SUSE Bug 1049418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049421</URL>
        <Description>SUSE Bug 1049421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049422</URL>
        <Description>SUSE Bug 1049422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066242</URL>
        <Description>SUSE Bug 1066242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071906</URL>
        <Description>SUSE Bug 1071906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957814</URL>
        <Description>SUSE Bug 957814</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
