SUSE-SU-2021:0955-2

Source
https://www.suse.com/support/update/announcement/2021/suse-su-20210955-2/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:0955-2.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:0955-2
Related
Published
2022-07-13T13:53:46Z
Modified
2022-07-13T13:53:46Z
Summary
Security update for openssl-1_1
Details

This update for openssl-1_1 fixes the security issue:

  • CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signaturealgorithms extension but includes a signaturealgorithms_cert extension, then a NULL pointer dereference will result, leading to a crash and a denial of service attack. OpenSSL TLS clients are not impacted by this issue. [bsc#1183852]
References

Affected packages

SUSE:Linux Enterprise Module for Certifications 15 SP3 / openssl-1_1

Package

Name
openssl-1_1
Purl
purl:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Certifications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1d-11.20.1

Ecosystem specific

{
    "binaries": [
        {
            "libopenssl1_1-32bit": "1.1.1d-11.20.1",
            "openssl-1_1": "1.1.1d-11.20.1",
            "libopenssl1_1-hmac-32bit": "1.1.1d-11.20.1",
            "libopenssl-1_1-devel-32bit": "1.1.1d-11.20.1",
            "libopenssl1_1-hmac": "1.1.1d-11.20.1",
            "libopenssl-1_1-devel": "1.1.1d-11.20.1",
            "openssl-1_1-doc": "1.1.1d-11.20.1",
            "libopenssl1_1": "1.1.1d-11.20.1"
        }
    ]
}