[SUSE-SU-2021:0955-1] Security update for openssl-1_1

Severity Important
Affected Packages 4
CVEs 1

Security update for openssl-1_1

This update for openssl-1_1 fixes the security issue:

  • CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension but includes a signature_algorithms_cert extension, then a NULL pointer dereference will result, leading to a crash and a denial of service attack. OpenSSL TLS clients are not impacted by this issue. [bsc#1183852]
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/openssl-1_1?arch=x86_64&distro=slem-5 suse openssl-1_1 < 1.1.1d-11.20.1 slem-5 x86_64
Affected pkg:rpm/suse/openssl-1_1?arch=aarch64&distro=slem-5 suse openssl-1_1 < 1.1.1d-11.20.1 slem-5 aarch64
Affected pkg:rpm/suse/libopenssl1_1?arch=x86_64&distro=slem-5 suse libopenssl1_1 < 1.1.1d-11.20.1 slem-5 x86_64
Affected pkg:rpm/suse/libopenssl1_1?arch=aarch64&distro=slem-5 suse libopenssl1_1 < 1.1.1d-11.20.1 slem-5 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...