<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libopenssl-3-devel-3.1.4-15.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:14416-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-10-20T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-10-20T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-10-20T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libopenssl-3-devel-3.1.4-15.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libopenssl-3-devel-3.1.4-15.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-14416</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZAEWAWTQ662APXDOVFSO6WSPPJ73EELU/</URL>
      <Description>E-Mail link for openSUSE-SU-2024:14416-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-50782/</URL>
      <Description>SUSE CVE CVE-2023-50782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-9143/</URL>
      <Description>SUSE CVE CVE-2024-9143 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-devel-3.1.4-15.1">
      <FullProductName ProductID="libopenssl-3-devel-3.1.4-15.1">libopenssl-3-devel-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-devel-32bit-3.1.4-15.1">
      <FullProductName ProductID="libopenssl-3-devel-32bit-3.1.4-15.1">libopenssl-3-devel-32bit-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-fips-provider-3.1.4-15.1">
      <FullProductName ProductID="libopenssl-3-fips-provider-3.1.4-15.1">libopenssl-3-fips-provider-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-fips-provider-32bit-3.1.4-15.1">
      <FullProductName ProductID="libopenssl-3-fips-provider-32bit-3.1.4-15.1">libopenssl-3-fips-provider-32bit-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1">
      <FullProductName ProductID="libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1">libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-3.1.4-15.1">
      <FullProductName ProductID="libopenssl3-3.1.4-15.1">libopenssl3-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-32bit-3.1.4-15.1">
      <FullProductName ProductID="libopenssl3-32bit-3.1.4-15.1">libopenssl3-32bit-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-x86-64-v3-3.1.4-15.1">
      <FullProductName ProductID="libopenssl3-x86-64-v3-3.1.4-15.1">libopenssl3-x86-64-v3-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-3-3.1.4-15.1">
      <FullProductName ProductID="openssl-3-3.1.4-15.1">openssl-3-3.1.4-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-3-doc-3.1.4-15.1">
      <FullProductName ProductID="openssl-3-doc-3.1.4-15.1">openssl-3-doc-3.1.4-15.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl-3-devel-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1">libopenssl-3-devel-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-devel-32bit-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1">libopenssl-3-devel-32bit-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-fips-provider-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1">libopenssl-3-fips-provider-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-fips-provider-32bit-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1">libopenssl-3-fips-provider-32bit-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1">libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl3-3.1.4-15.1">libopenssl3-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-32bit-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1">libopenssl3-32bit-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-x86-64-v3-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1">libopenssl3-x86-64-v3-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssl-3-3.1.4-15.1">openssl-3-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-doc-3.1.4-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1">openssl-3-doc-3.1.4-15.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.</Note>
    </Notes>
    <CVE>CVE-2023-50782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-3-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZAEWAWTQ662APXDOVFSO6WSPPJ73EELU/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-50782.html</URL>
        <Description>CVE-2023-50782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218043</URL>
        <Description>SUSE Bug 1218043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted
explicit values for the field polynomial can lead to out-of-bounds memory reads
or writes.

Impact summary: Out of bound memory writes can lead to an application crash or
even a possibility of a remote code execution, however, in all the protocols
involving Elliptic Curve Cryptography that we're aware of, either only "named
curves" are supported, or, if explicit curve parameters are supported, they
specify an X9.62 encoding of binary (GF(2^m)) curves that can't represent
problematic input values. Thus the likelihood of existence of a vulnerable
application is low.

In particular, the X9.62 encoding is used for ECC keys in X.509 certificates,
so problematic inputs cannot occur in the context of processing X.509
certificates.  Any problematic use-cases would have to be using an "exotic"
curve encoding.

The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),
and various supporting BN_GF2m_*() functions.

Applications working with "exotic" explicit binary (GF(2^m)) curve parameters,
that make it possible to represent invalid field polynomials with a zero
constant term, via the above or similar APIs, may terminate abruptly as a
result of reading or writing outside of array bounds.  Remote code execution
cannot easily be ruled out.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.</Note>
    </Notes>
    <CVE>CVE-2024-9143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-3-devel-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-32bit-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-3-3.1.4-15.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-3-doc-3.1.4-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZAEWAWTQ662APXDOVFSO6WSPPJ73EELU/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-9143.html</URL>
        <Description>CVE-2024-9143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231741</URL>
        <Description>SUSE Bug 1231741</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
