{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for compat-openssl097g","title":"Title of the patch"},{"category":"description","text":"\nOpenSSL was updated to fix several security issues:\n\n    * CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by\n      rejecting connections with DH parameters shorter than 1024 bits.\n      2048-bit DH parameters are now generated by default.\n    * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.\n    * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent\n      was fixed.\n    * Fixed a timing side channel in RSA decryption. (bsc#929678)\n\nAdditional changes:\n\n    * In the default SSL cipher string EXPORT ciphers are now disabled.\n      This will only get active if applications get rebuilt and actually\n      use this string. (bsc#931698)\n\nSecurity Issues:\n\n    * CVE-2015-1789\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789>\n    * CVE-2015-1790\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790>\n    * CVE-2015-4000\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000>\n\n","title":"Description of the patch"},{"category":"details","text":"sledsp3-compat-openssl097g,slesappsp3-compat-openssl097g","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1183-2.json"},{"category":"self","summary":"URL for SUSE-SU-2015:1183-2","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20151183-2/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2015:1183-2","url":"https://lists.suse.com/pipermail/sle-security-updates/2015-July/001482.html"},{"category":"self","summary":"SUSE Bug 912014","url":"https://bugzilla.suse.com/912014"},{"category":"self","summary":"SUSE Bug 912015","url":"https://bugzilla.suse.com/912015"},{"category":"self","summary":"SUSE Bug 912018","url":"https://bugzilla.suse.com/912018"},{"category":"self","summary":"SUSE Bug 912293","url":"https://bugzilla.suse.com/912293"},{"category":"self","summary":"SUSE Bug 912296","url":"https://bugzilla.suse.com/912296"},{"category":"self","summary":"SUSE Bug 922488","url":"https://bugzilla.suse.com/922488"},{"category":"self","summary":"SUSE Bug 922496","url":"https://bugzilla.suse.com/922496"},{"category":"self","summary":"SUSE Bug 922499","url":"https://bugzilla.suse.com/922499"},{"category":"self","summary":"SUSE Bug 922500","url":"https://bugzilla.suse.com/922500"},{"category":"self","summary":"SUSE Bug 922501","url":"https://bugzilla.suse.com/922501"},{"category":"self","summary":"SUSE Bug 929678","url":"https://bugzilla.suse.com/929678"},{"category":"self","summary":"SUSE Bug 931698","url":"https://bugzilla.suse.com/931698"},{"category":"self","summary":"SUSE Bug 934489","url":"https://bugzilla.suse.com/934489"},{"category":"self","summary":"SUSE Bug 934491","url":"https://bugzilla.suse.com/934491"},{"category":"self","summary":"SUSE CVE CVE-2014-3570 page","url":"https://www.suse.com/security/cve/CVE-2014-3570/"},{"category":"self","summary":"SUSE CVE CVE-2014-3572 page","url":"https://www.suse.com/security/cve/CVE-2014-3572/"},{"category":"self","summary":"SUSE CVE CVE-2014-8275 page","url":"https://www.suse.com/security/cve/CVE-2014-8275/"},{"category":"self","summary":"SUSE CVE CVE-2015-0204 page","url":"https://www.suse.com/security/cve/CVE-2015-0204/"},{"category":"self","summary":"SUSE CVE CVE-2015-0205 page","url":"https://www.suse.com/security/cve/CVE-2015-0205/"},{"category":"self","summary":"SUSE CVE CVE-2015-0286 page","url":"https://www.suse.com/security/cve/CVE-2015-0286/"},{"category":"self","summary":"SUSE CVE CVE-2015-0287 page","url":"https://www.suse.com/security/cve/CVE-2015-0287/"},{"category":"self","summary":"SUSE CVE CVE-2015-0288 page","url":"https://www.suse.com/security/cve/CVE-2015-0288/"},{"category":"self","summary":"SUSE CVE CVE-2015-0289 page","url":"https://www.suse.com/security/cve/CVE-2015-0289/"},{"category":"self","summary":"SUSE CVE CVE-2015-0292 page","url":"https://www.suse.com/security/cve/CVE-2015-0292/"},{"category":"self","summary":"SUSE CVE CVE-2015-0293 page","url":"https://www.suse.com/security/cve/CVE-2015-0293/"},{"category":"self","summary":"SUSE CVE CVE-2015-1789 page","url":"https://www.suse.com/security/cve/CVE-2015-1789/"},{"category":"self","summary":"SUSE CVE CVE-2015-1790 page","url":"https://www.suse.com/security/cve/CVE-2015-1790/"},{"category":"self","summary":"SUSE CVE CVE-2015-4000 page","url":"https://www.suse.com/security/cve/CVE-2015-4000/"}],"title":"Security update for compat-openssl097g","tracking":{"current_release_date":"2015-06-19T09:33:13Z","generator":{"date":"2015-06-19T09:33:13Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2015:1183-2","initial_release_date":"2015-06-19T09:33:13Z","revision_history":[{"date":"2015-06-19T09:33:13Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"compat-openssl097g-0.9.7g-146.22.31.1.i586","product":{"name":"compat-openssl097g-0.9.7g-146.22.31.1.i586","product_id":"compat-openssl097g-0.9.7g-146.22.31.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"compat-openssl097g-0.9.7g-146.22.31.1.x86_64","product":{"name":"compat-openssl097g-0.9.7g-146.22.31.1.x86_64","product_id":"compat-openssl097g-0.9.7g-146.22.31.1.x86_64"}},{"category":"product_version","name":"compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","product":{"name":"compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","product_id":"compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Desktop 11 SP3","product":{"name":"SUSE Linux Enterprise Desktop 11 SP3","product_id":"SUSE Linux Enterprise Desktop 11 SP3","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sled:11:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 11 SP3","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 11 SP3","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP3","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:11:sp3"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"compat-openssl097g-0.9.7g-146.22.31.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3","product_id":"SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586"},"product_reference":"compat-openssl097g-0.9.7g-146.22.31.1.i586","relates_to_product_reference":"SUSE Linux Enterprise Desktop 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"compat-openssl097g-0.9.7g-146.22.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3","product_id":"SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64"},"product_reference":"compat-openssl097g-0.9.7g-146.22.31.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Desktop 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3","product_id":"SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"},"product_reference":"compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Desktop 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"compat-openssl097g-0.9.7g-146.22.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64"},"product_reference":"compat-openssl097g-0.9.7g-146.22.31.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP3"},{"category":"default_component_of","full_product_name":{"name":"compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"},"product_reference":"compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP3"}]},"vulnerabilities":[{"cve":"CVE-2014-3570","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-3570"}],"notes":[{"category":"general","text":"The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2014-3570","url":"https://www.suse.com/security/cve/CVE-2014-3570"},{"category":"external","summary":"SUSE Bug 912296 for CVE-2014-3570","url":"https://bugzilla.suse.com/912296"},{"category":"external","summary":"SUSE Bug 915848 for CVE-2014-3570","url":"https://bugzilla.suse.com/915848"},{"category":"external","summary":"SUSE Bug 927623 for CVE-2014-3570","url":"https://bugzilla.suse.com/927623"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2014-3570","url":"https://bugzilla.suse.com/937891"},{"category":"external","summary":"SUSE Bug 944456 for CVE-2014-3570","url":"https://bugzilla.suse.com/944456"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"moderate"}],"title":"CVE-2014-3570"},{"cve":"CVE-2014-3572","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-3572"}],"notes":[{"category":"general","text":"The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2014-3572","url":"https://www.suse.com/security/cve/CVE-2014-3572"},{"category":"external","summary":"SUSE Bug 912015 for CVE-2014-3572","url":"https://bugzilla.suse.com/912015"},{"category":"external","summary":"SUSE Bug 915848 for CVE-2014-3572","url":"https://bugzilla.suse.com/915848"},{"category":"external","summary":"SUSE Bug 927623 for CVE-2014-3572","url":"https://bugzilla.suse.com/927623"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2014-3572","url":"https://bugzilla.suse.com/937891"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"moderate"}],"title":"CVE-2014-3572"},{"cve":"CVE-2014-8275","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2014-8275"}],"notes":[{"category":"general","text":"OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2014-8275","url":"https://www.suse.com/security/cve/CVE-2014-8275"},{"category":"external","summary":"SUSE Bug 912018 for CVE-2014-8275","url":"https://bugzilla.suse.com/912018"},{"category":"external","summary":"SUSE Bug 915848 for CVE-2014-8275","url":"https://bugzilla.suse.com/915848"},{"category":"external","summary":"SUSE Bug 927623 for CVE-2014-8275","url":"https://bugzilla.suse.com/927623"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2014-8275","url":"https://bugzilla.suse.com/937891"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"moderate"}],"title":"CVE-2014-8275"},{"cve":"CVE-2015-0204","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-0204"}],"notes":[{"category":"general","text":"The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the \"FREAK\" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-0204","url":"https://www.suse.com/security/cve/CVE-2015-0204"},{"category":"external","summary":"SUSE Bug 912014 for CVE-2015-0204","url":"https://bugzilla.suse.com/912014"},{"category":"external","summary":"SUSE Bug 920482 for CVE-2015-0204","url":"https://bugzilla.suse.com/920482"},{"category":"external","summary":"SUSE Bug 920484 for CVE-2015-0204","url":"https://bugzilla.suse.com/920484"},{"category":"external","summary":"SUSE Bug 927591 for CVE-2015-0204","url":"https://bugzilla.suse.com/927591"},{"category":"external","summary":"SUSE Bug 927623 for CVE-2015-0204","url":"https://bugzilla.suse.com/927623"},{"category":"external","summary":"SUSE Bug 936787 for CVE-2015-0204","url":"https://bugzilla.suse.com/936787"},{"category":"external","summary":"SUSE Bug 952088 for CVE-2015-0204","url":"https://bugzilla.suse.com/952088"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"critical"}],"title":"CVE-2015-0204"},{"cve":"CVE-2015-0205","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-0205"}],"notes":[{"category":"general","text":"The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-0205","url":"https://www.suse.com/security/cve/CVE-2015-0205"},{"category":"external","summary":"SUSE Bug 912293 for CVE-2015-0205","url":"https://bugzilla.suse.com/912293"},{"category":"external","summary":"SUSE Bug 915848 for CVE-2015-0205","url":"https://bugzilla.suse.com/915848"},{"category":"external","summary":"SUSE Bug 927623 for CVE-2015-0205","url":"https://bugzilla.suse.com/927623"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2015-0205","url":"https://bugzilla.suse.com/937891"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"moderate"}],"title":"CVE-2015-0205"},{"cve":"CVE-2015-0286","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-0286"}],"notes":[{"category":"general","text":"The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-0286","url":"https://www.suse.com/security/cve/CVE-2015-0286"},{"category":"external","summary":"SUSE Bug 912014 for CVE-2015-0286","url":"https://bugzilla.suse.com/912014"},{"category":"external","summary":"SUSE Bug 919648 for CVE-2015-0286","url":"https://bugzilla.suse.com/919648"},{"category":"external","summary":"SUSE Bug 922496 for CVE-2015-0286","url":"https://bugzilla.suse.com/922496"},{"category":"external","summary":"SUSE Bug 936586 for CVE-2015-0286","url":"https://bugzilla.suse.com/936586"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2015-0286","url":"https://bugzilla.suse.com/937891"},{"category":"external","summary":"SUSE Bug 951391 for CVE-2015-0286","url":"https://bugzilla.suse.com/951391"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"critical"}],"title":"CVE-2015-0286"},{"cve":"CVE-2015-0287","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-0287"}],"notes":[{"category":"general","text":"The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-0287","url":"https://www.suse.com/security/cve/CVE-2015-0287"},{"category":"external","summary":"SUSE Bug 912014 for CVE-2015-0287","url":"https://bugzilla.suse.com/912014"},{"category":"external","summary":"SUSE Bug 919648 for CVE-2015-0287","url":"https://bugzilla.suse.com/919648"},{"category":"external","summary":"SUSE Bug 922499 for CVE-2015-0287","url":"https://bugzilla.suse.com/922499"},{"category":"external","summary":"SUSE Bug 936586 for CVE-2015-0287","url":"https://bugzilla.suse.com/936586"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2015-0287","url":"https://bugzilla.suse.com/937891"},{"category":"external","summary":"SUSE Bug 968888 for CVE-2015-0287","url":"https://bugzilla.suse.com/968888"},{"category":"external","summary":"SUSE Bug 991722 for CVE-2015-0287","url":"https://bugzilla.suse.com/991722"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"critical"}],"title":"CVE-2015-0287"},{"cve":"CVE-2015-0288","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-0288"}],"notes":[{"category":"general","text":"The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-0288","url":"https://www.suse.com/security/cve/CVE-2015-0288"},{"category":"external","summary":"SUSE Bug 912014 for CVE-2015-0288","url":"https://bugzilla.suse.com/912014"},{"category":"external","summary":"SUSE Bug 919648 for CVE-2015-0288","url":"https://bugzilla.suse.com/919648"},{"category":"external","summary":"SUSE Bug 920236 for CVE-2015-0288","url":"https://bugzilla.suse.com/920236"},{"category":"external","summary":"SUSE Bug 936586 for CVE-2015-0288","url":"https://bugzilla.suse.com/936586"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2015-0288","url":"https://bugzilla.suse.com/937891"},{"category":"external","summary":"SUSE Bug 951391 for CVE-2015-0288","url":"https://bugzilla.suse.com/951391"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"critical"}],"title":"CVE-2015-0288"},{"cve":"CVE-2015-0289","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-0289"}],"notes":[{"category":"general","text":"The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-0289","url":"https://www.suse.com/security/cve/CVE-2015-0289"},{"category":"external","summary":"SUSE Bug 912014 for CVE-2015-0289","url":"https://bugzilla.suse.com/912014"},{"category":"external","summary":"SUSE Bug 919648 for CVE-2015-0289","url":"https://bugzilla.suse.com/919648"},{"category":"external","summary":"SUSE Bug 922500 for CVE-2015-0289","url":"https://bugzilla.suse.com/922500"},{"category":"external","summary":"SUSE Bug 936586 for CVE-2015-0289","url":"https://bugzilla.suse.com/936586"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2015-0289","url":"https://bugzilla.suse.com/937891"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"critical"}],"title":"CVE-2015-0289"},{"cve":"CVE-2015-0292","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-0292"}],"notes":[{"category":"general","text":"Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-0292","url":"https://www.suse.com/security/cve/CVE-2015-0292"},{"category":"external","summary":"SUSE Bug 912014 for CVE-2015-0292","url":"https://bugzilla.suse.com/912014"},{"category":"external","summary":"SUSE Bug 919648 for CVE-2015-0292","url":"https://bugzilla.suse.com/919648"},{"category":"external","summary":"SUSE Bug 922501 for CVE-2015-0292","url":"https://bugzilla.suse.com/922501"},{"category":"external","summary":"SUSE Bug 936586 for CVE-2015-0292","url":"https://bugzilla.suse.com/936586"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"critical"}],"title":"CVE-2015-0292"},{"cve":"CVE-2015-0293","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-0293"}],"notes":[{"category":"general","text":"The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-0293","url":"https://www.suse.com/security/cve/CVE-2015-0293"},{"category":"external","summary":"SUSE Bug 912014 for CVE-2015-0293","url":"https://bugzilla.suse.com/912014"},{"category":"external","summary":"SUSE Bug 919648 for CVE-2015-0293","url":"https://bugzilla.suse.com/919648"},{"category":"external","summary":"SUSE Bug 922488 for CVE-2015-0293","url":"https://bugzilla.suse.com/922488"},{"category":"external","summary":"SUSE Bug 936586 for CVE-2015-0293","url":"https://bugzilla.suse.com/936586"},{"category":"external","summary":"SUSE Bug 968044 for CVE-2015-0293","url":"https://bugzilla.suse.com/968044"},{"category":"external","summary":"SUSE Bug 968051 for CVE-2015-0293","url":"https://bugzilla.suse.com/968051"},{"category":"external","summary":"SUSE Bug 968053 for CVE-2015-0293","url":"https://bugzilla.suse.com/968053"},{"category":"external","summary":"SUSE Bug 986238 for CVE-2015-0293","url":"https://bugzilla.suse.com/986238"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"critical"}],"title":"CVE-2015-0293"},{"cve":"CVE-2015-1789","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-1789"}],"notes":[{"category":"general","text":"The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-1789","url":"https://www.suse.com/security/cve/CVE-2015-1789"},{"category":"external","summary":"SUSE Bug 934489 for CVE-2015-1789","url":"https://bugzilla.suse.com/934489"},{"category":"external","summary":"SUSE Bug 934666 for CVE-2015-1789","url":"https://bugzilla.suse.com/934666"},{"category":"external","summary":"SUSE Bug 936586 for CVE-2015-1789","url":"https://bugzilla.suse.com/936586"},{"category":"external","summary":"SUSE Bug 937891 for CVE-2015-1789","url":"https://bugzilla.suse.com/937891"},{"category":"external","summary":"SUSE Bug 938432 for CVE-2015-1789","url":"https://bugzilla.suse.com/938432"},{"category":"external","summary":"SUSE Bug 951391 for CVE-2015-1789","url":"https://bugzilla.suse.com/951391"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"important"}],"title":"CVE-2015-1789"},{"cve":"CVE-2015-1790","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-1790"}],"notes":[{"category":"general","text":"The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-1790","url":"https://www.suse.com/security/cve/CVE-2015-1790"},{"category":"external","summary":"SUSE Bug 934491 for CVE-2015-1790","url":"https://bugzilla.suse.com/934491"},{"category":"external","summary":"SUSE Bug 934666 for CVE-2015-1790","url":"https://bugzilla.suse.com/934666"},{"category":"external","summary":"SUSE Bug 936586 for CVE-2015-1790","url":"https://bugzilla.suse.com/936586"},{"category":"external","summary":"SUSE Bug 938432 for CVE-2015-1790","url":"https://bugzilla.suse.com/938432"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"moderate"}],"title":"CVE-2015-1790"},{"cve":"CVE-2015-4000","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-4000"}],"notes":[{"category":"general","text":"The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-4000","url":"https://www.suse.com/security/cve/CVE-2015-4000"},{"category":"external","summary":"SUSE Bug 1074631 for CVE-2015-4000","url":"https://bugzilla.suse.com/1074631"},{"category":"external","summary":"SUSE Bug 1211968 for CVE-2015-4000","url":"https://bugzilla.suse.com/1211968"},{"category":"external","summary":"SUSE Bug 931600 for CVE-2015-4000","url":"https://bugzilla.suse.com/931600"},{"category":"external","summary":"SUSE Bug 931698 for CVE-2015-4000","url":"https://bugzilla.suse.com/931698"},{"category":"external","summary":"SUSE Bug 931723 for CVE-2015-4000","url":"https://bugzilla.suse.com/931723"},{"category":"external","summary":"SUSE Bug 931845 for CVE-2015-4000","url":"https://bugzilla.suse.com/931845"},{"category":"external","summary":"SUSE Bug 932026 for CVE-2015-4000","url":"https://bugzilla.suse.com/932026"},{"category":"external","summary":"SUSE Bug 932483 for CVE-2015-4000","url":"https://bugzilla.suse.com/932483"},{"category":"external","summary":"SUSE Bug 934789 for CVE-2015-4000","url":"https://bugzilla.suse.com/934789"},{"category":"external","summary":"SUSE Bug 935033 for CVE-2015-4000","url":"https://bugzilla.suse.com/935033"},{"category":"external","summary":"SUSE Bug 935540 for CVE-2015-4000","url":"https://bugzilla.suse.com/935540"},{"category":"external","summary":"SUSE Bug 935979 for CVE-2015-4000","url":"https://bugzilla.suse.com/935979"},{"category":"external","summary":"SUSE Bug 937202 for CVE-2015-4000","url":"https://bugzilla.suse.com/937202"},{"category":"external","summary":"SUSE Bug 937766 for CVE-2015-4000","url":"https://bugzilla.suse.com/937766"},{"category":"external","summary":"SUSE Bug 938248 for CVE-2015-4000","url":"https://bugzilla.suse.com/938248"},{"category":"external","summary":"SUSE Bug 938432 for CVE-2015-4000","url":"https://bugzilla.suse.com/938432"},{"category":"external","summary":"SUSE Bug 938895 for CVE-2015-4000","url":"https://bugzilla.suse.com/938895"},{"category":"external","summary":"SUSE Bug 938905 for CVE-2015-4000","url":"https://bugzilla.suse.com/938905"},{"category":"external","summary":"SUSE Bug 938906 for CVE-2015-4000","url":"https://bugzilla.suse.com/938906"},{"category":"external","summary":"SUSE Bug 938913 for CVE-2015-4000","url":"https://bugzilla.suse.com/938913"},{"category":"external","summary":"SUSE Bug 938945 for CVE-2015-4000","url":"https://bugzilla.suse.com/938945"},{"category":"external","summary":"SUSE Bug 943664 for CVE-2015-4000","url":"https://bugzilla.suse.com/943664"},{"category":"external","summary":"SUSE Bug 944729 for CVE-2015-4000","url":"https://bugzilla.suse.com/944729"},{"category":"external","summary":"SUSE Bug 945582 for CVE-2015-4000","url":"https://bugzilla.suse.com/945582"},{"category":"external","summary":"SUSE Bug 955589 for CVE-2015-4000","url":"https://bugzilla.suse.com/955589"},{"category":"external","summary":"SUSE Bug 980406 for CVE-2015-4000","url":"https://bugzilla.suse.com/980406"},{"category":"external","summary":"SUSE Bug 990592 for CVE-2015-4000","url":"https://bugzilla.suse.com/990592"},{"category":"external","summary":"SUSE Bug 994144 for CVE-2015-4000","url":"https://bugzilla.suse.com/994144"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.7,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.0"},"products":["SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.i586","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Desktop 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-0.9.7g-146.22.31.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 11 SP3:compat-openssl097g-32bit-0.9.7g-146.22.31.1.x86_64"]}],"threats":[{"category":"impact","date":"2015-06-19T09:33:13Z","details":"important"}],"title":"CVE-2015-4000"}]}