<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssl-3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:2020-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-13T10:41:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-13T10:41:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-13T10:41:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssl-3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openssl-3 fixes the following issues:

- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/ltss/sle15.5/sle15:latest-2024-2020,SUSE-2024-2020,SUSE-SLE-Module-Basesystem-15-SP5-2024-2020,openSUSE-SLE-15.5-2024-2020</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242020-1/</URL>
      <Description>Link for SUSE-SU-2024:2020-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-June/018712.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:2020-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225551</URL>
      <Description>SUSE Bug 1225551</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4741/</URL>
      <Description>SUSE CVE CVE-2024-4741 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/ltss/sle15.5/sle15:latest">
      <Branch Type="Product Name" Name="Container suse/ltss/sle15.5/sle15:latest">
        <FullProductName ProductID="Container suse/ltss/sle15.5/sle15:latest">Container suse/ltss/sle15.5/sle15:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5" CPE="cpe:/o:suse:sle-module-basesystem:15:sp5">SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-3.0.8-150500.5.36.1">
      <FullProductName ProductID="libopenssl3-3.0.8-150500.5.36.1">libopenssl3-3.0.8-150500.5.36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-3-3.0.8-150500.5.36.1">
      <FullProductName ProductID="openssl-3-3.0.8-150500.5.36.1">openssl-3-3.0.8-150500.5.36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-devel-3.0.8-150500.5.36.1">
      <FullProductName ProductID="libopenssl-3-devel-3.0.8-150500.5.36.1">libopenssl-3-devel-3.0.8-150500.5.36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-devel-32bit-3.0.8-150500.5.36.1">
      <FullProductName ProductID="libopenssl-3-devel-32bit-3.0.8-150500.5.36.1">libopenssl-3-devel-32bit-3.0.8-150500.5.36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-devel-64bit-3.0.8-150500.5.36.1">
      <FullProductName ProductID="libopenssl-3-devel-64bit-3.0.8-150500.5.36.1">libopenssl-3-devel-64bit-3.0.8-150500.5.36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-32bit-3.0.8-150500.5.36.1">
      <FullProductName ProductID="libopenssl3-32bit-3.0.8-150500.5.36.1">libopenssl3-32bit-3.0.8-150500.5.36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-64bit-3.0.8-150500.5.36.1">
      <FullProductName ProductID="libopenssl3-64bit-3.0.8-150500.5.36.1">libopenssl3-64bit-3.0.8-150500.5.36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-3-doc-3.0.8-150500.5.36.1">
      <FullProductName ProductID="openssl-3-doc-3.0.8-150500.5.36.1">openssl-3-doc-3.0.8-150500.5.36.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl3-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/ltss/sle15.5/sle15:latest">
      <FullProductName ProductID="Container suse/ltss/sle15.5/sle15:latest:libopenssl3-3.0.8-150500.5.36.1">libopenssl3-3.0.8-150500.5.36.1 as a component of Container suse/ltss/sle15.5/sle15:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/ltss/sle15.5/sle15:latest">
      <FullProductName ProductID="Container suse/ltss/sle15.5/sle15:latest:openssl-3-3.0.8-150500.5.36.1">openssl-3-3.0.8-150500.5.36.1 as a component of Container suse/ltss/sle15.5/sle15:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-devel-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.36.1">libopenssl-3-devel-3.0.8-150500.5.36.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.36.1">libopenssl3-3.0.8-150500.5.36.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.36.1">openssl-3-3.0.8-150500.5.36.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-devel-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.36.1">libopenssl-3-devel-3.0.8-150500.5.36.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-devel-32bit-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.36.1">libopenssl-3-devel-32bit-3.0.8-150500.5.36.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.36.1">libopenssl3-3.0.8-150500.5.36.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-32bit-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.36.1">libopenssl3-32bit-3.0.8-150500.5.36.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.36.1">openssl-3-3.0.8-150500.5.36.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-doc-3.0.8-150500.5.36.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.36.1">openssl-3-doc-3.0.8-150500.5.36.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause
memory to be accessed that was previously freed in some situations

Impact summary: A use after free can have a range of potential consequences such
as the corruption of valid data, crashes or execution of arbitrary code.
However, only applications that directly call the SSL_free_buffers function are
affected by this issue. Applications that do not call this function are not
vulnerable. Our investigations indicate that this function is rarely used by
applications.

The SSL_free_buffers function is used to free the internal OpenSSL buffer used
when processing an incoming record from the network. The call is only expected
to succeed if the buffer is not currently in use. However, two scenarios have
been identified where the buffer is freed even when still in use.

The first scenario occurs where a record header has been received from the
network and processed by OpenSSL, but the full record body has not yet arrived.
In this case calling SSL_free_buffers will succeed even though a record has only
been partially processed and the buffer is still in use.

The second scenario occurs where a full record containing application data has
been received and processed by OpenSSL but the application has only read part of
this data. Again a call to SSL_free_buffers will succeed even though the buffer
is still in use.

While these scenarios could occur accidentally during normal operation a
malicious attacker could attempt to engineer a stituation where this occurs.
We are not aware of this issue being actively exploited.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.</Note>
    </Notes>
    <CVE>CVE-2024-4741</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/ltss/sle15.5/sle15:latest:libopenssl3-3.0.8-150500.5.36.1</ProductID>
        <ProductID>Container suse/ltss/sle15.5/sle15:latest:openssl-3-3.0.8-150500.5.36.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.36.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.36.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.36.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.36.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.36.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.36.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.36.1</ProductID>
        <ProductID>openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.36.1</ProductID>
        <ProductID>openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242020-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4741.html</URL>
        <Description>CVE-2024-4741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225551</URL>
        <Description>SUSE Bug 1225551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225552</URL>
        <Description>SUSE Bug 1225552</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
