<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:0442-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-02-12T09:27:01Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-02-12T09:27:01Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-02-12T09:27:01Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for openssl fixes the following issues:

- CVE-2015-3197: A malicious client can negotiate SSLv2 ciphers that have been disabled on the server and complete SSLv2 handshakes even if all SSLv2 ciphers have been disabled, provided that the SSLv2 protocol was not also disabled via SSL_OP_NO_SSLv2. (boo#963415)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160442-1/</URL>
      <Description>Link for SUSE-SU-2016:0442-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for SUSE-SU-2016:0442-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="libopenssl-devel-1.0.1k-11.78.1">
      <FullProductName ProductID="libopenssl-devel-1.0.1k-11.78.1">libopenssl-devel-1.0.1k-11.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-devel-32bit-1.0.1k-11.78.1">
      <FullProductName ProductID="libopenssl-devel-32bit-1.0.1k-11.78.1">libopenssl-devel-32bit-1.0.1k-11.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-1.0.1k-11.78.1">
      <FullProductName ProductID="libopenssl1_0_0-1.0.1k-11.78.1">libopenssl1_0_0-1.0.1k-11.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-32bit-1.0.1k-11.78.1">
      <FullProductName ProductID="libopenssl1_0_0-32bit-1.0.1k-11.78.1">libopenssl1_0_0-32bit-1.0.1k-11.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-1.0.1k-11.78.1">
      <FullProductName ProductID="openssl-1.0.1k-11.78.1">openssl-1.0.1k-11.78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-doc-1.0.1k-11.78.1">
      <FullProductName ProductID="openssl-doc-1.0.1k-11.78.1">openssl-doc-1.0.1k-11.78.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.</Note>
    </Notes>
    <CVE>CVE-2015-3197</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160442-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3197.html</URL>
        <Description>CVE-2015-3197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963410</URL>
        <Description>SUSE Bug 963410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963415</URL>
        <Description>SUSE Bug 963415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968046</URL>
        <Description>SUSE Bug 968046</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
