Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libopenssl-3-devel-3.0.5-1.1 on GA media
Notes
Title of the patch
libopenssl-3-devel-3.0.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the libopenssl-3-devel-3.0.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12204
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libopenssl-3-devel-3.0.5-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libopenssl-3-devel-3.0.5-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12204", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12204-1.json", }, { category: "self", summary: "SUSE CVE CVE-2022-1292 page", url: "https://www.suse.com/security/cve/CVE-2022-1292/", }, { category: "self", summary: "SUSE CVE CVE-2022-1343 page", url: "https://www.suse.com/security/cve/CVE-2022-1343/", }, { category: "self", summary: "SUSE CVE CVE-2022-1434 page", url: "https://www.suse.com/security/cve/CVE-2022-1434/", }, { category: "self", summary: "SUSE CVE CVE-2022-1473 page", url: "https://www.suse.com/security/cve/CVE-2022-1473/", }, { category: "self", summary: "SUSE CVE CVE-2022-2097 page", url: "https://www.suse.com/security/cve/CVE-2022-2097/", }, { category: "self", summary: "SUSE CVE CVE-2022-2274 page", url: "https://www.suse.com/security/cve/CVE-2022-2274/", }, ], title: "libopenssl-3-devel-3.0.5-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12204-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libopenssl-3-devel-3.0.5-1.1.aarch64", product: { name: "libopenssl-3-devel-3.0.5-1.1.aarch64", product_id: "libopenssl-3-devel-3.0.5-1.1.aarch64", }, }, { category: "product_version", name: "libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", product: { name: "libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", product_id: "libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", }, }, { category: "product_version", name: "libopenssl3-3.0.5-1.1.aarch64", product: { name: "libopenssl3-3.0.5-1.1.aarch64", product_id: "libopenssl3-3.0.5-1.1.aarch64", }, }, { category: "product_version", name: "libopenssl3-32bit-3.0.5-1.1.aarch64", product: { name: "libopenssl3-32bit-3.0.5-1.1.aarch64", product_id: "libopenssl3-32bit-3.0.5-1.1.aarch64", }, }, { category: "product_version", name: "openssl-3-3.0.5-1.1.aarch64", product: { name: "openssl-3-3.0.5-1.1.aarch64", product_id: "openssl-3-3.0.5-1.1.aarch64", }, }, { category: "product_version", name: "openssl-3-doc-3.0.5-1.1.aarch64", product: { name: "openssl-3-doc-3.0.5-1.1.aarch64", product_id: "openssl-3-doc-3.0.5-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libopenssl-3-devel-3.0.5-1.1.ppc64le", product: { name: "libopenssl-3-devel-3.0.5-1.1.ppc64le", product_id: "libopenssl-3-devel-3.0.5-1.1.ppc64le", }, }, { category: "product_version", name: "libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", product: { name: "libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", product_id: "libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", }, }, { category: "product_version", name: "libopenssl3-3.0.5-1.1.ppc64le", product: { name: "libopenssl3-3.0.5-1.1.ppc64le", product_id: "libopenssl3-3.0.5-1.1.ppc64le", }, }, { category: "product_version", name: "libopenssl3-32bit-3.0.5-1.1.ppc64le", product: { name: "libopenssl3-32bit-3.0.5-1.1.ppc64le", product_id: "libopenssl3-32bit-3.0.5-1.1.ppc64le", }, }, { category: "product_version", name: "openssl-3-3.0.5-1.1.ppc64le", product: { name: "openssl-3-3.0.5-1.1.ppc64le", product_id: "openssl-3-3.0.5-1.1.ppc64le", }, }, { category: "product_version", name: "openssl-3-doc-3.0.5-1.1.ppc64le", product: { name: "openssl-3-doc-3.0.5-1.1.ppc64le", product_id: "openssl-3-doc-3.0.5-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libopenssl-3-devel-3.0.5-1.1.s390x", product: { name: "libopenssl-3-devel-3.0.5-1.1.s390x", product_id: "libopenssl-3-devel-3.0.5-1.1.s390x", }, }, { category: "product_version", name: "libopenssl-3-devel-32bit-3.0.5-1.1.s390x", product: { name: "libopenssl-3-devel-32bit-3.0.5-1.1.s390x", product_id: "libopenssl-3-devel-32bit-3.0.5-1.1.s390x", }, }, { category: "product_version", name: "libopenssl3-3.0.5-1.1.s390x", product: { name: "libopenssl3-3.0.5-1.1.s390x", product_id: "libopenssl3-3.0.5-1.1.s390x", }, }, { category: "product_version", name: "libopenssl3-32bit-3.0.5-1.1.s390x", product: { name: "libopenssl3-32bit-3.0.5-1.1.s390x", product_id: "libopenssl3-32bit-3.0.5-1.1.s390x", }, }, { category: "product_version", name: "openssl-3-3.0.5-1.1.s390x", product: { name: "openssl-3-3.0.5-1.1.s390x", product_id: "openssl-3-3.0.5-1.1.s390x", }, }, { category: "product_version", name: "openssl-3-doc-3.0.5-1.1.s390x", product: { name: "openssl-3-doc-3.0.5-1.1.s390x", product_id: "openssl-3-doc-3.0.5-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libopenssl-3-devel-3.0.5-1.1.x86_64", product: { name: "libopenssl-3-devel-3.0.5-1.1.x86_64", product_id: "libopenssl-3-devel-3.0.5-1.1.x86_64", }, }, { category: "product_version", name: "libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", product: { name: "libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", product_id: "libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", }, }, { category: "product_version", name: "libopenssl3-3.0.5-1.1.x86_64", product: { name: "libopenssl3-3.0.5-1.1.x86_64", product_id: "libopenssl3-3.0.5-1.1.x86_64", }, }, { category: "product_version", name: "libopenssl3-32bit-3.0.5-1.1.x86_64", product: { name: "libopenssl3-32bit-3.0.5-1.1.x86_64", product_id: "libopenssl3-32bit-3.0.5-1.1.x86_64", }, }, { category: "product_version", name: "openssl-3-3.0.5-1.1.x86_64", product: { name: "openssl-3-3.0.5-1.1.x86_64", product_id: "openssl-3-3.0.5-1.1.x86_64", }, }, { category: "product_version", name: "openssl-3-doc-3.0.5-1.1.x86_64", product: { name: "openssl-3-doc-3.0.5-1.1.x86_64", product_id: "openssl-3-doc-3.0.5-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libopenssl-3-devel-3.0.5-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", }, product_reference: "libopenssl-3-devel-3.0.5-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl-3-devel-3.0.5-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", }, product_reference: "libopenssl-3-devel-3.0.5-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl-3-devel-3.0.5-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", }, product_reference: "libopenssl-3-devel-3.0.5-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl-3-devel-3.0.5-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", }, product_reference: "libopenssl-3-devel-3.0.5-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl-3-devel-32bit-3.0.5-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", }, product_reference: "libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", }, product_reference: "libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl-3-devel-32bit-3.0.5-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", }, product_reference: "libopenssl-3-devel-32bit-3.0.5-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl-3-devel-32bit-3.0.5-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", }, product_reference: "libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl3-3.0.5-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", }, product_reference: "libopenssl3-3.0.5-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl3-3.0.5-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", }, product_reference: "libopenssl3-3.0.5-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl3-3.0.5-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", }, product_reference: "libopenssl3-3.0.5-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl3-3.0.5-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", }, product_reference: "libopenssl3-3.0.5-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl3-32bit-3.0.5-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", }, product_reference: "libopenssl3-32bit-3.0.5-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl3-32bit-3.0.5-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", }, product_reference: "libopenssl3-32bit-3.0.5-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl3-32bit-3.0.5-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", }, product_reference: "libopenssl3-32bit-3.0.5-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libopenssl3-32bit-3.0.5-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", }, product_reference: "libopenssl3-32bit-3.0.5-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "openssl-3-3.0.5-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", }, product_reference: "openssl-3-3.0.5-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "openssl-3-3.0.5-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", }, product_reference: "openssl-3-3.0.5-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "openssl-3-3.0.5-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", }, product_reference: "openssl-3-3.0.5-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "openssl-3-3.0.5-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", }, product_reference: "openssl-3-3.0.5-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "openssl-3-doc-3.0.5-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", }, product_reference: "openssl-3-doc-3.0.5-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "openssl-3-doc-3.0.5-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", }, product_reference: "openssl-3-doc-3.0.5-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "openssl-3-doc-3.0.5-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", }, product_reference: "openssl-3-doc-3.0.5-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "openssl-3-doc-3.0.5-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", }, product_reference: "openssl-3-doc-3.0.5-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2022-1292", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1292", }, ], notes: [ { category: "general", text: "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1292", url: "https://www.suse.com/security/cve/CVE-2022-1292", }, { category: "external", summary: "SUSE Bug 1199166 for CVE-2022-1292", url: "https://bugzilla.suse.com/1199166", }, { category: "external", summary: "SUSE Bug 1200550 for CVE-2022-1292", url: "https://bugzilla.suse.com/1200550", }, { category: "external", summary: "SUSE Bug 1200650 for CVE-2022-1292", url: "https://bugzilla.suse.com/1200650", }, { category: "external", summary: "SUSE Bug 1200758 for CVE-2022-1292", url: "https://bugzilla.suse.com/1200758", }, { category: "external", summary: "SUSE Bug 1202688 for CVE-2022-1292", url: "https://bugzilla.suse.com/1202688", }, { category: "external", summary: "SUSE Bug 1225628 for CVE-2022-1292", url: "https://bugzilla.suse.com/1225628", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1292", }, { cve: "CVE-2022-1343", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1343", }, ], notes: [ { category: "general", text: "The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL \"ocsp\" application. When verifying an ocsp response with the \"-no_cert_checks\" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1343", url: "https://www.suse.com/security/cve/CVE-2022-1343", }, { category: "external", summary: "SUSE Bug 1199167 for CVE-2022-1343", url: "https://bugzilla.suse.com/1199167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1343", }, { cve: "CVE-2022-1434", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1434", }, ], notes: [ { category: "general", text: "The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being sent from one endpoint to an OpenSSL 3.0 recipient such that the modified data would still pass the MAC integrity check. Note that data sent from an OpenSSL 3.0 endpoint to a non-OpenSSL 3.0 endpoint will always be rejected by the recipient and the connection will fail at that point. Many application protocols require data to be sent from the client to the server first. Therefore, in such a case, only an OpenSSL 3.0 server would be impacted when talking to a non-OpenSSL 3.0 client. If both endpoints are OpenSSL 3.0 then the attacker could modify data being sent in both directions. In this case both clients and servers could be affected, regardless of the application protocol. Note that in the absence of an attacker this bug means that an OpenSSL 3.0 endpoint communicating with a non-OpenSSL 3.0 endpoint will fail to complete the handshake when using this ciphersuite. The confidentiality of data is not impacted by this issue, i.e. an attacker cannot decrypt data that has been encrypted using this ciphersuite - they can only modify it. In order for this attack to work both endpoints must legitimately negotiate the RC4-MD5 ciphersuite. This ciphersuite is not compiled by default in OpenSSL 3.0, and is not available within the default provider or the default ciphersuite list. This ciphersuite will never be used if TLSv1.3 has been negotiated. In order for an OpenSSL 3.0 endpoint to use this ciphersuite the following must have occurred: 1) OpenSSL must have been compiled with the (non-default) compile time option enable-weak-ssl-ciphers 2) OpenSSL must have had the legacy provider explicitly loaded (either through application code or via configuration) 3) The ciphersuite must have been explicitly added to the ciphersuite list 4) The libssl security level must have been set to 0 (default is 1) 5) A version of SSL/TLS below TLSv1.3 must have been negotiated 6) Both endpoints must negotiate the RC4-MD5 ciphersuite in preference to any others that both endpoints have in common Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1434", url: "https://www.suse.com/security/cve/CVE-2022-1434", }, { category: "external", summary: "SUSE Bug 1199168 for CVE-2022-1434", url: "https://bugzilla.suse.com/1199168", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-1434", }, { cve: "CVE-2022-1473", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1473", }, ], notes: [ { category: "general", text: "The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1473", url: "https://www.suse.com/security/cve/CVE-2022-1473", }, { category: "external", summary: "SUSE Bug 1199168 for CVE-2022-1473", url: "https://bugzilla.suse.com/1199168", }, { category: "external", summary: "SUSE Bug 1199169 for CVE-2022-1473", url: "https://bugzilla.suse.com/1199169", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-1473", }, { cve: "CVE-2022-2097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2097", }, ], notes: [ { category: "general", text: "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2097", url: "https://www.suse.com/security/cve/CVE-2022-2097", }, { category: "external", summary: "SUSE Bug 1201099 for CVE-2022-2097", url: "https://bugzilla.suse.com/1201099", }, { category: "external", summary: "SUSE Bug 1201332 for CVE-2022-2097", url: "https://bugzilla.suse.com/1201332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2097", }, { cve: "CVE-2022-2274", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2274", }, ], notes: [ { category: "general", text: "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2274", url: "https://www.suse.com/security/cve/CVE-2022-2274", }, { category: "external", summary: "SUSE Bug 1201148 for CVE-2022-2274", url: "https://bugzilla.suse.com/1201148", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.s390x", "openSUSE Tumbleweed:libopenssl3-32bit-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-3.0.5-1.1.x86_64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.aarch64", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.ppc64le", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.s390x", "openSUSE Tumbleweed:openssl-3-doc-3.0.5-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2022-2274", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.