{"affected":[{"ecosystem_specific":{"binaries":[{"libopenssl1_0_0":"1.0.1i-54.5.1","libopenssl1_0_0-32bit":"1.0.1i-54.5.1","openssl":"1.0.1i-54.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP1","name":"openssl","purl":"pkg:rpm/suse/openssl&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.1i-54.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libopenssl-devel":"1.0.1i-54.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"openssl","purl":"pkg:rpm/suse/openssl&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.1i-54.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libopenssl1_0_0":"1.0.1i-54.5.1","libopenssl1_0_0-32bit":"1.0.1i-54.5.1","libopenssl1_0_0-hmac":"1.0.1i-54.5.1","libopenssl1_0_0-hmac-32bit":"1.0.1i-54.5.1","openssl":"1.0.1i-54.5.1","openssl-doc":"1.0.1i-54.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"openssl","purl":"pkg:rpm/suse/openssl&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.1i-54.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libopenssl1_0_0":"1.0.1i-54.5.1","libopenssl1_0_0-32bit":"1.0.1i-54.5.1","libopenssl1_0_0-hmac":"1.0.1i-54.5.1","libopenssl1_0_0-hmac-32bit":"1.0.1i-54.5.1","openssl":"1.0.1i-54.5.1","openssl-doc":"1.0.1i-54.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"openssl","purl":"pkg:rpm/suse/openssl&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.1i-54.5.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for openssl fixes the following issues contained in the\nOpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)\n\nSecurity issues fixed:\n- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)\n- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)\n- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)\n- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085, CVE-2017-3731)\n- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)\n\nBugs fixed:\n- fix crash in openssl speed (bsc#1000677)\n- fix ca-bundle path (bsc#1022271)\n","id":"SUSE-SU-2017:0461-1","modified":"2017-02-14T14:18:29Z","published":"2017-02-14T14:18:29Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20170461-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1000677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1001912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1004499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1005878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019334"},{"type":"REPORT","url":"https://bugzilla.suse.com/1021641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1022271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7056"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-3731"}],"related":["CVE-2016-2108","CVE-2016-7056","CVE-2016-8610","CVE-2017-3731"],"summary":"Security update for openssl","upstream":["CVE-2016-2108","CVE-2016-7056","CVE-2016-8610","CVE-2017-3731"]}