{"affected":[{"ecosystem_specific":{"binaries":[{"libopenssl-1_1-devel":"1.1.1d-11.20.1","libopenssl-1_1-devel-32bit":"1.1.1d-11.20.1","libopenssl1_1":"1.1.1d-11.20.1","libopenssl1_1-32bit":"1.1.1d-11.20.1","libopenssl1_1-hmac":"1.1.1d-11.20.1","libopenssl1_1-hmac-32bit":"1.1.1d-11.20.1","openssl-1_1":"1.1.1d-11.20.1","openssl-1_1-doc":"1.1.1d-11.20.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Certifications 15 SP3","name":"openssl-1_1","purl":"pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Certifications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1.1d-11.20.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openssl-1_1 fixes the security issue:\n\n* CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted\n  renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation\n  ClientHello omits the signature_algorithms extension but includes a\n  signature_algorithms_cert extension, then a NULL pointer dereference will\n  result, leading to a crash and a denial of service attack. OpenSSL TLS\n  clients are not impacted by this issue. [bsc#1183852]\n","id":"SUSE-SU-2021:0955-2","modified":"2022-07-13T13:53:46Z","published":"2022-07-13T13:53:46Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20210955-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1183852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3449"}],"related":["CVE-2021-3449"],"summary":"Security update for openssl-1_1","upstream":["CVE-2021-3449"]}