<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0627-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-03-02T07:15:13Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-03-02T07:15:13Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-03-02T07:15:13Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for openssl fixes the following issues:

Security issues fixed:
- CVE-2016-0800 aka the &amp;quot;DROWN&amp;quot; attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:
  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    &amp;quot;OPENSSL_ALLOW_SSL2&amp;quot; or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

    Please also note that we built the 13.2 openSUSE openssl already with &amp;quot;no-ssl2&amp;quot;.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    &amp;quot;OPENSSL_ALLOW_EXPORT&amp;quot;.

- CVE-2016-0702 aka the &amp;quot;CacheBleed&amp;quot; attack. (bsc#968050)
  Various changes in the modular exponentation code were added that
  make sure that it is not possible to recover RSA secret keys by
  analyzing cache-bank conflicts on the Intel Sandy-Bridge microarchitecture.

  Note that this was only exploitable if the malicious code was running
  on the same hyper threaded Intel Sandy Bridge processor as the victim
  thread performing decryptions.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could
  result in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever called by
  user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config
  files or application command line arguments. If user developed
  applications generated config file data based on untrusted data,
  then this could have had security consequences as well.

- CVE-2016-0798 (bnc#968265)
  The SRP user database lookup method SRP_VBASE_get_by_user() had a memory
  leak that attackers could abuse to facility DoS attacks. To mitigate
  the issue, the seed handling in SRP_VBASE_get_by_user() was disabled
  even if the user has configured a seed. Applications are advised to

- We're unaffected by CVE-2016-0799 (boo#968374) because we use glibc's
  printf implementation instead of the built in one

Bugs fixed:
- avoid running OPENSSL_config twice. This avoids breaking
  engine loading. (boo#952871)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0627-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-devel-1.0.1k-2.33.1">
      <FullProductName ProductID="libopenssl-devel-1.0.1k-2.33.1">libopenssl-devel-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-devel-32bit-1.0.1k-2.33.1">
      <FullProductName ProductID="libopenssl-devel-32bit-1.0.1k-2.33.1">libopenssl-devel-32bit-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-1.0.1k-2.33.1">
      <FullProductName ProductID="libopenssl1_0_0-1.0.1k-2.33.1">libopenssl1_0_0-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-32bit-1.0.1k-2.33.1">
      <FullProductName ProductID="libopenssl1_0_0-32bit-1.0.1k-2.33.1">libopenssl1_0_0-32bit-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-debuginfo-1.0.1k-2.33.1">
      <FullProductName ProductID="libopenssl1_0_0-debuginfo-1.0.1k-2.33.1">libopenssl1_0_0-debuginfo-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1">
      <FullProductName ProductID="libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1">libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-hmac-1.0.1k-2.33.1">
      <FullProductName ProductID="libopenssl1_0_0-hmac-1.0.1k-2.33.1">libopenssl1_0_0-hmac-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1">
      <FullProductName ProductID="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1">libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-1.0.1k-2.33.1">
      <FullProductName ProductID="openssl-1.0.1k-2.33.1">openssl-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-debuginfo-1.0.1k-2.33.1">
      <FullProductName ProductID="openssl-debuginfo-1.0.1k-2.33.1">openssl-debuginfo-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-debugsource-1.0.1k-2.33.1">
      <FullProductName ProductID="openssl-debugsource-1.0.1k-2.33.1">openssl-debugsource-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-doc-1.0.1k-2.33.1">
      <FullProductName ProductID="openssl-doc-1.0.1k-2.33.1">openssl-doc-1.0.1k-2.33.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl-devel-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libopenssl-devel-1.0.1k-2.33.1">libopenssl-devel-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-devel-32bit-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libopenssl-devel-32bit-1.0.1k-2.33.1">libopenssl-devel-32bit-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libopenssl1_0_0-1.0.1k-2.33.1">libopenssl1_0_0-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-32bit-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libopenssl1_0_0-32bit-1.0.1k-2.33.1">libopenssl1_0_0-32bit-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-debuginfo-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libopenssl1_0_0-debuginfo-1.0.1k-2.33.1">libopenssl1_0_0-debuginfo-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1">libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-hmac-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libopenssl1_0_0-hmac-1.0.1k-2.33.1">libopenssl1_0_0-hmac-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1">libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:openssl-1.0.1k-2.33.1">openssl-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-debuginfo-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:openssl-debuginfo-1.0.1k-2.33.1">openssl-debuginfo-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-debugsource-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:openssl-debugsource-1.0.1k-2.33.1">openssl-debugsource-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-doc-1.0.1k-2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:openssl-doc-1.0.1k-2.33.1">openssl-doc-1.0.1k-2.33.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.</Note>
    </Notes>
    <CVE>CVE-2016-0702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libopenssl-devel-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl-devel-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debugsource-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-doc-1.0.1k-2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0702.html</URL>
        <Description>CVE-2016-0702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007806</URL>
        <Description>SUSE Bug 1007806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968050</URL>
        <Description>SUSE Bug 968050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971238</URL>
        <Description>SUSE Bug 971238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990370</URL>
        <Description>SUSE Bug 990370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.</Note>
    </Notes>
    <CVE>CVE-2016-0705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libopenssl-devel-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl-devel-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debugsource-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-doc-1.0.1k-2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.5</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0705.html</URL>
        <Description>CVE-2016-0705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968047</URL>
        <Description>SUSE Bug 968047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971238</URL>
        <Description>SUSE Bug 971238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976341</URL>
        <Description>SUSE Bug 976341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.</Note>
    </Notes>
    <CVE>CVE-2016-0797</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libopenssl-devel-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl-devel-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debugsource-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-doc-1.0.1k-2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0797.html</URL>
        <Description>CVE-2016-0797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968048</URL>
        <Description>SUSE Bug 968048</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990370</URL>
        <Description>SUSE Bug 990370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.</Note>
    </Notes>
    <CVE>CVE-2016-0798</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libopenssl-devel-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl-devel-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debugsource-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-doc-1.0.1k-2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0798.html</URL>
        <Description>CVE-2016-0798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968265</URL>
        <Description>SUSE Bug 968265</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.</Note>
    </Notes>
    <CVE>CVE-2016-0799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libopenssl-devel-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl-devel-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debugsource-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-doc-1.0.1k-2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.5</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0799.html</URL>
        <Description>CVE-2016-0799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968374</URL>
        <Description>SUSE Bug 968374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969517</URL>
        <Description>SUSE Bug 969517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989345</URL>
        <Description>SUSE Bug 989345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990370</URL>
        <Description>SUSE Bug 990370</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991722</URL>
        <Description>SUSE Bug 991722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.</Note>
    </Notes>
    <CVE>CVE-2016-0800</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:libopenssl-devel-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl-devel-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-debuginfo-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debuginfo-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-debugsource-1.0.1k-2.33.1</ProductID>
        <ProductID>openSUSE 13.2:openssl-doc-1.0.1k-2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0800.html</URL>
        <Description>CVE-2016-0800</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961377</URL>
        <Description>SUSE Bug 961377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968046</URL>
        <Description>SUSE Bug 968046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968888</URL>
        <Description>SUSE Bug 968888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979060</URL>
        <Description>SUSE Bug 979060</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
