openSUSE-SU-2020:2236-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2020:2236-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2020:2236-1
Related
Published
2020-12-12T14:43:28Z
Modified
2020-12-12T14:43:28Z
Summary
Security update for openssl-1_0_0
Details

This update for openssl-100 fixes the following issues:

  • CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
  • Initialized dh->nid to NIDundef in DHnew_method() (bsc#1177673).
  • Fixed a test failure in apache_ssl in fips mode (bsc#1177793).
  • Renamed BNgetrfc3526prime* functions back to getrfc3526prime_* (bsc#1177575).
  • Restored private key check in ECKEYcheck_key (bsc#1177479).
  • Added shared secret KAT to FIPS DH selftest (bsc#1176029).
  • Included ECDH/DH Requirements from SP800-56Arev3 (bsc#1176029).
  • Used SHA-2 in the RSA pairwise consistency check (bsc#1155346)

This update was imported from the SUSE:SLE-15:Update update project.

References

Affected packages

openSUSE:Leap 15.2 / openssl-1_0_0

Package

Name
openssl-1_0_0
Purl
purl:rpm/suse/openssl-1_0_0&distro=openSUSE%20Leap%2015.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2p-lp152.8.9.1

Ecosystem specific

{
    "binaries": [
        {
            "libopenssl1_0_0": "1.0.2p-lp152.8.9.1",
            "libopenssl1_0_0-steam": "1.0.2p-lp152.8.9.1",
            "libopenssl-1_0_0-devel": "1.0.2p-lp152.8.9.1",
            "libopenssl1_0_0-steam-32bit": "1.0.2p-lp152.8.9.1",
            "openssl-1_0_0-doc": "1.0.2p-lp152.8.9.1",
            "openssl-1_0_0-cavs": "1.0.2p-lp152.8.9.1",
            "libopenssl-1_0_0-devel-32bit": "1.0.2p-lp152.8.9.1",
            "libopenssl1_0_0-hmac": "1.0.2p-lp152.8.9.1",
            "libopenssl1_0_0-32bit": "1.0.2p-lp152.8.9.1",
            "libopenssl1_0_0-hmac-32bit": "1.0.2p-lp152.8.9.1",
            "openssl-1_0_0": "1.0.2p-lp152.8.9.1",
            "libopenssl10": "1.0.2p-lp152.8.9.1"
        }
    ]
}