{"affected":[{"ecosystem_specific":{"binaries":[{"libopenssl1-devel":"1.0.1g-0.52.1","libopenssl1_0_0":"1.0.1g-0.52.1","libopenssl1_0_0-32bit":"1.0.1g-0.52.1","libopenssl1_0_0-x86":"1.0.1g-0.52.1","openssl1":"1.0.1g-0.52.1","openssl1-doc":"1.0.1g-0.52.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11-SECURITY","name":"openssl1","purl":"pkg:rpm/suse/openssl1&distro=SUSE%20Linux%20Enterprise%20Server%2011-SECURITY"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.1g-0.52.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for openssl1 fixes the following issues:\n\npenSSL Security Advisory [22 Sep 2016] (bsc#999665)\n\nSeverity: High\n* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)\n\nSeverity: Low\n* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)\n* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)\n* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)\n* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)\n* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)\n* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)\n* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)\n* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)\n* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)\n* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)\n\nMore information can be found on: https://www.openssl.org/news/secadv/20160922.txt\n\nAlso following bugs were fixed:\n* update expired S/MIME certs (bsc#979475)\n* improve s390x performance (bsc#982745)\n* fix crash in print_notice (bsc#998190)\n* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)\n","id":"SUSE-SU-2016:2469-1","modified":"2016-10-06T14:45:57Z","published":"2016-10-06T14:45:57Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162469-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/979475"},{"type":"REPORT","url":"https://bugzilla.suse.com/982575"},{"type":"REPORT","url":"https://bugzilla.suse.com/982745"},{"type":"REPORT","url":"https://bugzilla.suse.com/983249"},{"type":"REPORT","url":"https://bugzilla.suse.com/990419"},{"type":"REPORT","url":"https://bugzilla.suse.com/993819"},{"type":"REPORT","url":"https://bugzilla.suse.com/994749"},{"type":"REPORT","url":"https://bugzilla.suse.com/994844"},{"type":"REPORT","url":"https://bugzilla.suse.com/995075"},{"type":"REPORT","url":"https://bugzilla.suse.com/995324"},{"type":"REPORT","url":"https://bugzilla.suse.com/995359"},{"type":"REPORT","url":"https://bugzilla.suse.com/995377"},{"type":"REPORT","url":"https://bugzilla.suse.com/998190"},{"type":"REPORT","url":"https://bugzilla.suse.com/999665"},{"type":"REPORT","url":"https://bugzilla.suse.com/999666"},{"type":"REPORT","url":"https://bugzilla.suse.com/999668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2177"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6303"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6304"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6306"}],"related":["CVE-2016-2177","CVE-2016-2178","CVE-2016-2179","CVE-2016-2180","CVE-2016-2181","CVE-2016-2182","CVE-2016-2183","CVE-2016-6302","CVE-2016-6303","CVE-2016-6304","CVE-2016-6306"],"summary":"Security update for openssl1","upstream":["CVE-2016-2177","CVE-2016-2178","CVE-2016-2179","CVE-2016-2180","CVE-2016-2181","CVE-2016-2182","CVE-2016-2183","CVE-2016-6302","CVE-2016-6303","CVE-2016-6304","CVE-2016-6306"]}