SUSE-SU-2021:0955-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:0955-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:0955-1
Related
Published
2021-03-25T15:11:58Z
Modified
2021-03-25T15:11:58Z
Summary
Security update for openssl-1_1
Details

This update for openssl-1_1 fixes the security issue:

  • CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signaturealgorithms extension but includes a signaturealgorithms_cert extension, then a NULL pointer dereference will result, leading to a crash and a denial of service attack. OpenSSL TLS clients are not impacted by this issue. [bsc#1183852]
References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 SP2 / openssl-1_1

Package

Name
openssl-1_1
Purl
purl:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1d-11.20.1

Ecosystem specific

{
    "binaries": [
        {
            "libopenssl1_1-32bit": "1.1.1d-11.20.1",
            "libopenssl-1_1-devel": "1.1.1d-11.20.1",
            "libopenssl1_1-hmac-32bit": "1.1.1d-11.20.1",
            "libopenssl1_1-hmac": "1.1.1d-11.20.1",
            "libopenssl1_1": "1.1.1d-11.20.1",
            "openssl-1_1": "1.1.1d-11.20.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.0 / openssl-1_1

Package

Name
openssl-1_1
Purl
purl:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Micro%205.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1d-11.20.1

Ecosystem specific

{
    "binaries": [
        {
            "openssl-1_1": "1.1.1d-11.20.1",
            "libopenssl1_1": "1.1.1d-11.20.1"
        }
    ]
}