<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python-cryptography, python-pyOpenSSL</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1104-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-04-02T10:59:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-04-02T10:59:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-04-02T10:59:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python-cryptography, python-pyOpenSSL</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python-cryptography, python-pyOpenSSL fixes the following issues:

Security issues fixed:

- CVE-2018-1000808: A memory leak due to missing reference checking in PKCS#12 store handling was fixed (bsc#1111634)
- CVE-2018-1000807: A use-after-free in X509 object handling was fixed (bsc#1111635)

This update also contains the following tracked bug fixes:
    
- avoid bad interaction with python-cryptography package. (bsc#1021578)
- Avoid regression accessesing non-existing attribute _from_raw_x509_ptr in object X509 (bsc#1119077)
- Add python-setuptools as a requirement. (bsc#1052927)
  
This update was imported from the SUSE:SLE-12-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1104-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python-cryptography-1.3.1-5.3.1">
      <FullProductName ProductID="python-cryptography-1.3.1-5.3.1">python-cryptography-1.3.1-5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-pyOpenSSL-16.0.0-5.8.2">
      <FullProductName ProductID="python-pyOpenSSL-16.0.0-5.8.2">python-pyOpenSSL-16.0.0-5.8.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-pyOpenSSL-doc-16.0.0-5.8.2">
      <FullProductName ProductID="python-pyOpenSSL-doc-16.0.0-5.8.2">python-pyOpenSSL-doc-16.0.0-5.8.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-cryptography-1.3.1-5.3.1">
      <FullProductName ProductID="python3-cryptography-1.3.1-5.3.1">python3-cryptography-1.3.1-5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-pyOpenSSL-16.0.0-5.8.2">
      <FullProductName ProductID="python3-pyOpenSSL-16.0.0-5.8.2">python3-pyOpenSSL-16.0.0-5.8.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-pyOpenSSL-doc-16.0.0-5.8.2">
      <FullProductName ProductID="python3-pyOpenSSL-doc-16.0.0-5.8.2">python3-pyOpenSSL-doc-16.0.0-5.8.2</FullProductName>
    </Branch>
    <Relationship ProductReference="python-cryptography-1.3.1-5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:python-cryptography-1.3.1-5.3.1">python-cryptography-1.3.1-5.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-pyOpenSSL-16.0.0-5.8.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:python-pyOpenSSL-16.0.0-5.8.2">python-pyOpenSSL-16.0.0-5.8.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-pyOpenSSL-doc-16.0.0-5.8.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:python-pyOpenSSL-doc-16.0.0-5.8.2">python-pyOpenSSL-doc-16.0.0-5.8.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-cryptography-1.3.1-5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:python3-cryptography-1.3.1-5.3.1">python3-cryptography-1.3.1-5.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-pyOpenSSL-16.0.0-5.8.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:python3-pyOpenSSL-16.0.0-5.8.2">python3-pyOpenSSL-16.0.0-5.8.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-pyOpenSSL-doc-16.0.0-5.8.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:python3-pyOpenSSL-doc-16.0.0-5.8.2">python3-pyOpenSSL-doc-16.0.0-5.8.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.</Note>
    </Notes>
    <CVE>CVE-2018-1000807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:python-cryptography-1.3.1-5.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:python-pyOpenSSL-16.0.0-5.8.2</ProductID>
        <ProductID>openSUSE Leap 42.3:python-pyOpenSSL-doc-16.0.0-5.8.2</ProductID>
        <ProductID>openSUSE Leap 42.3:python3-cryptography-1.3.1-5.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:python3-pyOpenSSL-16.0.0-5.8.2</ProductID>
        <ProductID>openSUSE Leap 42.3:python3-pyOpenSSL-doc-16.0.0-5.8.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000807.html</URL>
        <Description>CVE-2018-1000807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111634</URL>
        <Description>SUSE Bug 1111634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111635</URL>
        <Description>SUSE Bug 1111635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.</Note>
    </Notes>
    <CVE>CVE-2018-1000808</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:python-cryptography-1.3.1-5.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:python-pyOpenSSL-16.0.0-5.8.2</ProductID>
        <ProductID>openSUSE Leap 42.3:python-pyOpenSSL-doc-16.0.0-5.8.2</ProductID>
        <ProductID>openSUSE Leap 42.3:python3-cryptography-1.3.1-5.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:python3-pyOpenSSL-16.0.0-5.8.2</ProductID>
        <ProductID>openSUSE Leap 42.3:python3-pyOpenSSL-doc-16.0.0-5.8.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000808.html</URL>
        <Description>CVE-2018-1000808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111634</URL>
        <Description>SUSE Bug 1111634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111635</URL>
        <Description>SUSE Bug 1111635</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
