suse-su-2025:20014-1
Vulnerability from csaf_suse
Published
2025-02-03 08:48
Modified
2025-02-03 08:48
Summary
Security update for openssl-3, libpulp, ulp-macros
Notes
Title of the patch
Security update for openssl-3, libpulp, ulp-macros
Description of the patch
This update for openssl-3, libpulp, ulp-macros fixes the following issues:
openssl-3:
- CVE-2024-6119: possible denial of service in X.509 name checks (bsc#1229465)
- CVE-2024-5535: SSL_select_next_proto buffer overread (bsc#1227138)
- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers (bsc#1225551)
- CVE-2024-4603: Check DSA parameters for excessive sizes before validating (bsc#1224388)
- CVE-2024-2511: Fix unconstrained session cache growth in TLSv1.3 (bsc#1222548)
- FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365)
- FIPS: RSA keygen PCT requirements. (bsc#1221760, bsc#1221753)
- FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. (bsc#1220523)
- FIPS: Port openssl to use jitterentropy (bsc#1220523)
- FIPS: Block non-Approved Elliptic Curves (bsc#1221786)
- FIPS: Service Level Indicator (bsc#1221365)
- FIPS: Output the FIPS-validation name and module version which uniquely identify the FIPS validated module. (bsc#1221751)
- FIPS: Add required selftests (bsc#1221760)
- FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821)
- FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827)
- FIPS: Zeroization is required (bsc#1221752)
- FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696)
- FIPS: NIST SP 800-56Brev2 (bsc#1221824)
- FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787)
- FIPS: Port openssl to use jitterentropy (bsc#1220523)
- FIPS: NIST SP 800-56Arev3 (bsc#1221822)
- FIPS: Error state has to be enforced (bsc#1221753)
- Build with enabled sm2 and sm4 support (bsc#1222899)
- fix non-reproducible build issue
- Fix HDKF key derivation (bsc#1225291)
- Enable livepatching support (bsc#1223428)
libpulp:
- Update package with libpulp-0.3.5
* Change .so load policy from lazy to eager.
* Fix patch of references when mprotect is enabled.
* Fix tramposed calloc arguments.
* Fix crash of ulp packer on empty lines.
- Disabled ptrace_scope through aaa_base-enable-ptrace package (bsc#1221763).
- Update package with libpulp-0.3.4:
* Add debuginfo into ulp extract.
- Disabled ptrace_scope when building the package (bsc#1221763).
- Update package with libpulp-0.3.3:
* Fixed a race condition when process list is empty.
* Removed "Unable to get section data" error message (bsc#1223306).
* Bumped asunsafe_conversion attempts from 100 to 2000.
* Fixed banner test on clang-18.
* Check if ptrace_scope is enabled when attempting a ptrace operation (bsc#1221763).
- Update package with libpulp-0.3.1:
* Add timestamp information on `ulp patches`.
ulp-macros:
- Initial release.
Patchnames
SUSE-SLE-Micro-6.0-58
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl-3, libpulp, ulp-macros", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl-3, libpulp, ulp-macros fixes the following issues:\n\nopenssl-3:\n - CVE-2024-6119: possible denial of service in X.509 name checks (bsc#1229465)\n - CVE-2024-5535: SSL_select_next_proto buffer overread (bsc#1227138)\n - CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers (bsc#1225551)\n - CVE-2024-4603: Check DSA parameters for excessive sizes before validating (bsc#1224388)\n - CVE-2024-2511: Fix unconstrained session cache growth in TLSv1.3 (bsc#1222548)\n - FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365)\n - FIPS: RSA keygen PCT requirements. (bsc#1221760, bsc#1221753)\n - FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. (bsc#1220523)\n - FIPS: Port openssl to use jitterentropy (bsc#1220523)\n - FIPS: Block non-Approved Elliptic Curves (bsc#1221786)\n - FIPS: Service Level Indicator (bsc#1221365)\n - FIPS: Output the FIPS-validation name and module version which uniquely identify the FIPS validated module. (bsc#1221751)\n - FIPS: Add required selftests (bsc#1221760)\n - FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821)\n - FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827)\n - FIPS: Zeroization is required (bsc#1221752)\n - FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696)\n - FIPS: NIST SP 800-56Brev2 (bsc#1221824)\n - FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787)\n - FIPS: Port openssl to use jitterentropy (bsc#1220523)\n - FIPS: NIST SP 800-56Arev3 (bsc#1221822)\n - FIPS: Error state has to be enforced (bsc#1221753)\n - Build with enabled sm2 and sm4 support (bsc#1222899)\n - fix non-reproducible build issue\n - Fix HDKF key derivation (bsc#1225291)\n - Enable livepatching support (bsc#1223428)\n\nlibpulp:\n - Update package with libpulp-0.3.5\n * Change .so load policy from lazy to eager.\n * Fix patch of references when mprotect is enabled.\n * Fix tramposed calloc arguments.\n * Fix crash of ulp packer on empty lines.\n\n - Disabled ptrace_scope through aaa_base-enable-ptrace package (bsc#1221763).\n - Update package with libpulp-0.3.4:\n * Add debuginfo into ulp extract.\n\n - Disabled ptrace_scope when building the package (bsc#1221763).\n - Update package with libpulp-0.3.3:\n * Fixed a race condition when process list is empty.\n * Removed \"Unable to get section data\" error message (bsc#1223306).\n * Bumped asunsafe_conversion attempts from 100 to 2000.\n * Fixed banner test on clang-18.\n * Check if ptrace_scope is enabled when attempting a ptrace operation (bsc#1221763).\n\n - Update package with libpulp-0.3.1:\n * Add timestamp information on `ulp patches`.\n\nulp-macros:\n - Initial release.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Micro-6.0-58", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20014-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:20014-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520014-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:20014-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html" }, { "category": "self", "summary": "SUSE Bug 1220523", "url": "https://bugzilla.suse.com/1220523" }, { "category": "self", "summary": "SUSE Bug 1220690", "url": "https://bugzilla.suse.com/1220690" }, { "category": "self", "summary": "SUSE Bug 1220693", "url": "https://bugzilla.suse.com/1220693" }, { "category": "self", "summary": "SUSE Bug 1220696", "url": "https://bugzilla.suse.com/1220696" }, { "category": "self", "summary": "SUSE Bug 1221365", "url": "https://bugzilla.suse.com/1221365" }, { "category": "self", "summary": "SUSE Bug 1221751", "url": "https://bugzilla.suse.com/1221751" }, { "category": "self", "summary": "SUSE Bug 1221752", "url": "https://bugzilla.suse.com/1221752" }, { "category": "self", "summary": "SUSE Bug 1221753", "url": "https://bugzilla.suse.com/1221753" }, { "category": "self", "summary": "SUSE Bug 1221760", "url": "https://bugzilla.suse.com/1221760" }, { "category": "self", "summary": "SUSE Bug 1221763", "url": "https://bugzilla.suse.com/1221763" }, { "category": "self", "summary": "SUSE Bug 1221786", "url": "https://bugzilla.suse.com/1221786" }, { "category": "self", "summary": "SUSE Bug 1221787", "url": "https://bugzilla.suse.com/1221787" }, { "category": "self", "summary": "SUSE Bug 1221821", "url": "https://bugzilla.suse.com/1221821" }, { "category": "self", "summary": "SUSE Bug 1221822", "url": "https://bugzilla.suse.com/1221822" }, { "category": "self", "summary": "SUSE Bug 1221824", "url": "https://bugzilla.suse.com/1221824" }, { "category": "self", "summary": "SUSE Bug 1221827", "url": "https://bugzilla.suse.com/1221827" }, { "category": "self", "summary": "SUSE Bug 1222548", "url": "https://bugzilla.suse.com/1222548" }, { "category": "self", "summary": "SUSE Bug 1222899", "url": "https://bugzilla.suse.com/1222899" }, { "category": "self", "summary": "SUSE Bug 1223306", "url": "https://bugzilla.suse.com/1223306" }, { "category": "self", "summary": "SUSE Bug 1223336", "url": "https://bugzilla.suse.com/1223336" }, { "category": "self", "summary": "SUSE Bug 1223428", "url": "https://bugzilla.suse.com/1223428" }, { "category": "self", "summary": "SUSE Bug 1224388", "url": "https://bugzilla.suse.com/1224388" }, { "category": "self", "summary": "SUSE Bug 1225291", "url": "https://bugzilla.suse.com/1225291" }, { "category": "self", "summary": "SUSE Bug 1225551", "url": "https://bugzilla.suse.com/1225551" }, { "category": "self", "summary": "SUSE Bug 1226463", "url": "https://bugzilla.suse.com/1226463" }, { "category": "self", "summary": "SUSE Bug 1227138", "url": "https://bugzilla.suse.com/1227138" }, { "category": "self", "summary": "SUSE Bug 1229465", "url": "https://bugzilla.suse.com/1229465" }, { "category": "self", "summary": "SUSE CVE CVE-2024-2511 page", "url": "https://www.suse.com/security/cve/CVE-2024-2511/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-4603 page", "url": "https://www.suse.com/security/cve/CVE-2024-4603/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-4741 page", "url": "https://www.suse.com/security/cve/CVE-2024-4741/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-5535 page", "url": "https://www.suse.com/security/cve/CVE-2024-5535/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-6119 page", "url": "https://www.suse.com/security/cve/CVE-2024-6119/" } ], "title": "Security update for openssl-3, libpulp, ulp-macros", "tracking": { "current_release_date": "2025-02-03T08:48:16Z", "generator": { "date": "2025-02-03T08:48:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:20014-1", "initial_release_date": "2025-02-03T08:48:16Z", "revision_history": [ { "date": "2025-02-03T08:48:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jitterentropy-devel-3.4.1-3.1.aarch64", "product": { "name": "jitterentropy-devel-3.4.1-3.1.aarch64", "product_id": "jitterentropy-devel-3.4.1-3.1.aarch64" } }, { "category": "product_version", "name": "libjitterentropy3-3.4.1-3.1.aarch64", "product": { "name": "libjitterentropy3-3.4.1-3.1.aarch64", "product_id": "libjitterentropy3-3.4.1-3.1.aarch64" } }, { "category": "product_version", "name": "libopenssl-3-devel-3.1.4-6.1.aarch64", "product": { "name": "libopenssl-3-devel-3.1.4-6.1.aarch64", "product_id": "libopenssl-3-devel-3.1.4-6.1.aarch64" } }, { "category": "product_version", "name": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "product": { "name": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "product_id": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64" } }, { "category": "product_version", "name": "libopenssl3-3.1.4-6.1.aarch64", "product": { "name": "libopenssl3-3.1.4-6.1.aarch64", "product_id": "libopenssl3-3.1.4-6.1.aarch64" } }, { "category": "product_version", "name": "openssl-3-3.1.4-6.1.aarch64", "product": { "name": "openssl-3-3.1.4-6.1.aarch64", "product_id": "openssl-3-3.1.4-6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "jitterentropy-devel-3.4.1-3.1.s390x", "product": { "name": "jitterentropy-devel-3.4.1-3.1.s390x", "product_id": "jitterentropy-devel-3.4.1-3.1.s390x" } }, { "category": "product_version", "name": "libjitterentropy3-3.4.1-3.1.s390x", "product": { "name": "libjitterentropy3-3.4.1-3.1.s390x", "product_id": "libjitterentropy3-3.4.1-3.1.s390x" } }, { "category": "product_version", "name": "libopenssl-3-devel-3.1.4-6.1.s390x", "product": { "name": "libopenssl-3-devel-3.1.4-6.1.s390x", "product_id": "libopenssl-3-devel-3.1.4-6.1.s390x" } }, { "category": "product_version", "name": "libopenssl-3-fips-provider-3.1.4-6.1.s390x", "product": { "name": "libopenssl-3-fips-provider-3.1.4-6.1.s390x", "product_id": "libopenssl-3-fips-provider-3.1.4-6.1.s390x" } }, { "category": "product_version", "name": "libopenssl3-3.1.4-6.1.s390x", "product": { "name": "libopenssl3-3.1.4-6.1.s390x", "product_id": "libopenssl3-3.1.4-6.1.s390x" } }, { "category": "product_version", "name": "openssl-3-3.1.4-6.1.s390x", "product": { "name": "openssl-3-3.1.4-6.1.s390x", "product_id": "openssl-3-3.1.4-6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jitterentropy-devel-3.4.1-3.1.x86_64", "product": { "name": "jitterentropy-devel-3.4.1-3.1.x86_64", "product_id": "jitterentropy-devel-3.4.1-3.1.x86_64" } }, { "category": "product_version", "name": "libjitterentropy3-3.4.1-3.1.x86_64", "product": { "name": "libjitterentropy3-3.4.1-3.1.x86_64", "product_id": "libjitterentropy3-3.4.1-3.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-3-devel-3.1.4-6.1.x86_64", "product": { "name": "libopenssl-3-devel-3.1.4-6.1.x86_64", "product_id": "libopenssl-3-devel-3.1.4-6.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "product": { "name": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "product_id": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64" } }, { "category": "product_version", "name": "libopenssl3-3.1.4-6.1.x86_64", "product": { "name": "libopenssl3-3.1.4-6.1.x86_64", "product_id": "libopenssl3-3.1.4-6.1.x86_64" } }, { "category": "product_version", "name": "libpulp-tools-0.3.5-1.1.x86_64", "product": { "name": "libpulp-tools-0.3.5-1.1.x86_64", "product_id": "libpulp-tools-0.3.5-1.1.x86_64" } }, { "category": "product_version", "name": "libpulp0-0.3.5-1.1.x86_64", "product": { "name": "libpulp0-0.3.5-1.1.x86_64", "product_id": "libpulp0-0.3.5-1.1.x86_64" } }, { "category": "product_version", "name": "openssl-3-3.1.4-6.1.x86_64", "product": { "name": "openssl-3-3.1.4-6.1.x86_64", "product_id": "openssl-3-3.1.4-6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Micro 6.0", "product": { "name": "SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0", "product_identification_helper": { "cpe": "cpe:/o:suse:sl-micro:6.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jitterentropy-devel-3.4.1-3.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64" }, "product_reference": "jitterentropy-devel-3.4.1-3.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jitterentropy-devel-3.4.1-3.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x" }, "product_reference": "jitterentropy-devel-3.4.1-3.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "jitterentropy-devel-3.4.1-3.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64" }, "product_reference": "jitterentropy-devel-3.4.1-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libjitterentropy3-3.4.1-3.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64" }, "product_reference": "libjitterentropy3-3.4.1-3.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libjitterentropy3-3.4.1-3.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x" }, "product_reference": "libjitterentropy3-3.4.1-3.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libjitterentropy3-3.4.1-3.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64" }, "product_reference": "libjitterentropy3-3.4.1-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.1.4-6.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64" }, "product_reference": "libopenssl-3-devel-3.1.4-6.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.1.4-6.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x" }, "product_reference": "libopenssl-3-devel-3.1.4-6.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.1.4-6.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64" }, "product_reference": "libopenssl-3-devel-3.1.4-6.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64" }, "product_reference": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-fips-provider-3.1.4-6.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x" }, "product_reference": "libopenssl-3-fips-provider-3.1.4-6.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64" }, "product_reference": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.1.4-6.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64" }, "product_reference": "libopenssl3-3.1.4-6.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.1.4-6.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x" }, "product_reference": "libopenssl3-3.1.4-6.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.1.4-6.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64" }, "product_reference": "libopenssl3-3.1.4-6.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libpulp-tools-0.3.5-1.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64" }, "product_reference": "libpulp-tools-0.3.5-1.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libpulp0-0.3.5-1.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64" }, "product_reference": "libpulp0-0.3.5-1.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.1.4-6.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64" }, "product_reference": "openssl-3-3.1.4-6.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.1.4-6.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x" }, "product_reference": "openssl-3-3.1.4-6.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.1.4-6.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" }, "product_reference": "openssl-3-3.1.4-6.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-2511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-2511" } ], "notes": [ { "category": "general", "text": "Issue summary: Some non-default TLS server configurations can cause unbounded\nmemory growth when processing TLSv1.3 sessions\n\nImpact summary: An attacker may exploit certain server configurations to trigger\nunbounded memory growth that would lead to a Denial of Service\n\nThis problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is\nbeing used (but not if early_data support is also configured and the default\nanti-replay protection is in use). In this case, under certain conditions, the\nsession cache can get into an incorrect state and it will fail to flush properly\nas it fills. The session cache will continue to grow in an unbounded manner. A\nmalicious client could deliberately create the scenario for this failure to\nforce a Denial of Service. It may also happen by accident in normal operation.\n\nThis issue only affects TLS servers supporting TLSv1.3. It does not affect TLS\nclients.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL\n1.0.2 is also not affected by this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-2511", "url": "https://www.suse.com/security/cve/CVE-2024-2511" }, { "category": "external", "summary": "SUSE Bug 1222548 for CVE-2024-2511", "url": "https://bugzilla.suse.com/1222548" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:48:16Z", "details": "moderate" } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-4603", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-4603" } ], "notes": [ { "category": "general", "text": "Issue summary: Checking excessively long DSA keys or parameters may be very\nslow.\n\nImpact summary: Applications that use the functions EVP_PKEY_param_check()\nor EVP_PKEY_public_check() to check a DSA public key or DSA parameters may\nexperience long delays. Where the key or parameters that are being checked\nhave been obtained from an untrusted source this may lead to a Denial of\nService.\n\nThe functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform\nvarious checks on DSA parameters. Some of those computations take a long time\nif the modulus (`p` parameter) is too large.\n\nTrying to use a very large modulus is slow and OpenSSL will not allow using\npublic keys with a modulus which is over 10,000 bits in length for signature\nverification. However the key and parameter check functions do not limit\nthe modulus size when performing the checks.\n\nAn application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check()\nand supplies a key or parameters obtained from an untrusted source could be\nvulnerable to a Denial of Service attack.\n\nThese functions are not called by OpenSSL itself on untrusted DSA keys so\nonly applications that directly call these functions may be vulnerable.\n\nAlso vulnerable are the OpenSSL pkey and pkeyparam command line applications\nwhen using the `-check` option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-4603", "url": "https://www.suse.com/security/cve/CVE-2024-4603" }, { "category": "external", "summary": "SUSE Bug 1224388 for CVE-2024-4603", "url": "https://bugzilla.suse.com/1224388" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:48:16Z", "details": "moderate" } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-4741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-4741" } ], "notes": [ { "category": "general", "text": "Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause\nmemory to be accessed that was previously freed in some situations\n\nImpact summary: A use after free can have a range of potential consequences such\nas the corruption of valid data, crashes or execution of arbitrary code.\nHowever, only applications that directly call the SSL_free_buffers function are\naffected by this issue. Applications that do not call this function are not\nvulnerable. Our investigations indicate that this function is rarely used by\napplications.\n\nThe SSL_free_buffers function is used to free the internal OpenSSL buffer used\nwhen processing an incoming record from the network. The call is only expected\nto succeed if the buffer is not currently in use. However, two scenarios have\nbeen identified where the buffer is freed even when still in use.\n\nThe first scenario occurs where a record header has been received from the\nnetwork and processed by OpenSSL, but the full record body has not yet arrived.\nIn this case calling SSL_free_buffers will succeed even though a record has only\nbeen partially processed and the buffer is still in use.\n\nThe second scenario occurs where a full record containing application data has\nbeen received and processed by OpenSSL but the application has only read part of\nthis data. Again a call to SSL_free_buffers will succeed even though the buffer\nis still in use.\n\nWhile these scenarios could occur accidentally during normal operation a\nmalicious attacker could attempt to engineer a stituation where this occurs.\nWe are not aware of this issue being actively exploited.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-4741", "url": "https://www.suse.com/security/cve/CVE-2024-4741" }, { "category": "external", "summary": "SUSE Bug 1225551 for CVE-2024-4741", "url": "https://bugzilla.suse.com/1225551" }, { "category": "external", "summary": "SUSE Bug 1225552 for CVE-2024-4741", "url": "https://bugzilla.suse.com/1225552" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:48:16Z", "details": "important" } ], "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-5535" } ], "notes": [ { "category": "general", "text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-5535", "url": "https://www.suse.com/security/cve/CVE-2024-5535" }, { "category": "external", "summary": "SUSE Bug 1227138 for CVE-2024-5535", "url": "https://bugzilla.suse.com/1227138" }, { "category": "external", "summary": "SUSE Bug 1227147 for CVE-2024-5535", "url": "https://bugzilla.suse.com/1227147" }, { "category": "external", "summary": "SUSE Bug 1227233 for CVE-2024-5535", "url": "https://bugzilla.suse.com/1227233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:48:16Z", "details": "moderate" } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-6119", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-6119" } ], "notes": [ { "category": "general", "text": "Issue summary: Applications performing certificate name checks (e.g., TLS\nclients checking server certificates) may attempt to read an invalid memory\naddress resulting in abnormal termination of the application process.\n\nImpact summary: Abnormal termination of an application can a cause a denial of\nservice.\n\nApplications performing certificate name checks (e.g., TLS clients checking\nserver certificates) may attempt to read an invalid memory address when\ncomparing the expected name with an `otherName` subject alternative name of an\nX.509 certificate. This may result in an exception that terminates the\napplication program.\n\nNote that basic certificate chain validation (signatures, dates, ...) is not\naffected, the denial of service can occur only when the application also\nspecifies an expected DNS name, Email address or IP address.\n\nTLS servers rarely solicit client certificates, and even when they do, they\ngenerally don\u0027t perform a name check against a reference identifier (expected\nidentity), but rather extract the presented identity after checking the\ncertificate chain. So TLS servers are generally not affected and the severity\nof the issue is Moderate.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-6119", "url": "https://www.suse.com/security/cve/CVE-2024-6119" }, { "category": "external", "summary": "SUSE Bug 1229465 for CVE-2024-6119", "url": "https://bugzilla.suse.com/1229465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x", "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64", "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x", "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-03T08:48:16Z", "details": "moderate" } ], "title": "CVE-2024-6119" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…