{"affected":[{"ecosystem_specific":{"binaries":[{"libopenssl-1_1-devel":"1.1.1d-11.30.1","libopenssl1_1":"1.1.1d-11.30.1","libopenssl1_1-hmac":"1.1.1d-11.30.1","openssl-1_1":"1.1.1d-11.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"openssl-1_1","purl":"pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1.1d-11.30.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openssl-1_1 fixes the following issues:\n\n- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. \n  Read buffer overruns processing ASN.1 strings (bsc#1189521).\n","id":"SUSE-SU-2021:2966-2","modified":"2021-09-21T14:38:54Z","published":"2021-09-21T14:38:54Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20212966-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189521"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3712"}],"related":["CVE-2021-3712"],"summary":"Security update for openssl-1_1","upstream":["CVE-2021-3712"]}