openSUSE-SU-2021:0476-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2021:0476-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2021:0476-1
Related
Published
2021-03-25T22:06:05Z
Modified
2021-03-25T22:06:05Z
Summary
Security update for openssl-1_1
Details

This update for openssl-1_1 fixes the security issue:

  • CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signaturealgorithms extension but includes a signaturealgorithms_cert extension, then a NULL pointer dereference will result, leading to a crash and a denial of service attack. OpenSSL TLS clients are not impacted by this issue. [bsc#1183852]

This update was imported from the SUSE:SLE-15-SP2:Update update project.

References

Affected packages

openSUSE:Leap 15.2 / openssl-1_1

Package

Name
openssl-1_1
Purl
purl:rpm/suse/openssl-1_1&distro=openSUSE%20Leap%2015.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1d-lp152.7.15.1

Ecosystem specific

{
    "binaries": [
        {
            "libopenssl1_1-32bit": "1.1.1d-lp152.7.15.1",
            "openssl-1_1": "1.1.1d-lp152.7.15.1",
            "libopenssl1_1-hmac-32bit": "1.1.1d-lp152.7.15.1",
            "libopenssl-1_1-devel-32bit": "1.1.1d-lp152.7.15.1",
            "libopenssl1_1-hmac": "1.1.1d-lp152.7.15.1",
            "libopenssl-1_1-devel": "1.1.1d-lp152.7.15.1",
            "openssl-1_1-doc": "1.1.1d-lp152.7.15.1",
            "libopenssl1_1": "1.1.1d-lp152.7.15.1"
        }
    ]
}