<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssl</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:2387-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-09-26T14:01:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-09-26T14:01:02Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-09-26T14:01:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssl</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for openssl fixes the following issues:

OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)

Severity: High
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666)

Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)

More information can be found on: https://www.openssl.org/news/secadv/20160922.txt

Also following bugs were fixed:
* update expired S/MIME certs (bsc#979475)
* improve s390x performance (bsc#982745)
* allow &gt;= 64GB AESGCM transfers (bsc#988591)
* fix crash in print_notice (bsc#998190)
* resume reading from /dev/urandom when interrupted by a signal (bsc#995075)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-2016-1386,SUSE-SLE-SERVER-12-2016-1386</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      <Description>Link for SUSE-SU-2016:2387-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:2387-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/979475</URL>
      <Description>SUSE Bug 979475</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/982575</URL>
      <Description>SUSE Bug 982575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/982745</URL>
      <Description>SUSE Bug 982745</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/983249</URL>
      <Description>SUSE Bug 983249</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/988591</URL>
      <Description>SUSE Bug 988591</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/990419</URL>
      <Description>SUSE Bug 990419</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993819</URL>
      <Description>SUSE Bug 993819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994749</URL>
      <Description>SUSE Bug 994749</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994844</URL>
      <Description>SUSE Bug 994844</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995075</URL>
      <Description>SUSE Bug 995075</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995324</URL>
      <Description>SUSE Bug 995324</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995359</URL>
      <Description>SUSE Bug 995359</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995377</URL>
      <Description>SUSE Bug 995377</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998190</URL>
      <Description>SUSE Bug 998190</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999665</URL>
      <Description>SUSE Bug 999665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999666</URL>
      <Description>SUSE Bug 999666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999668</URL>
      <Description>SUSE Bug 999668</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2177/</URL>
      <Description>SUSE CVE CVE-2016-2177 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2178/</URL>
      <Description>SUSE CVE CVE-2016-2178 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2179/</URL>
      <Description>SUSE CVE CVE-2016-2179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2180/</URL>
      <Description>SUSE CVE CVE-2016-2180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2181/</URL>
      <Description>SUSE CVE CVE-2016-2181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2182/</URL>
      <Description>SUSE CVE CVE-2016-2182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2183/</URL>
      <Description>SUSE CVE CVE-2016-2183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6302/</URL>
      <Description>SUSE CVE CVE-2016-6302 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6303/</URL>
      <Description>SUSE CVE CVE-2016-6303 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6304/</URL>
      <Description>SUSE CVE CVE-2016-6304 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6306/</URL>
      <Description>SUSE CVE CVE-2016-6306 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-1.0.1i-27.21.1">
      <FullProductName ProductID="libopenssl1_0_0-1.0.1i-27.21.1">libopenssl1_0_0-1.0.1i-27.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-32bit-1.0.1i-27.21.1">
      <FullProductName ProductID="libopenssl1_0_0-32bit-1.0.1i-27.21.1">libopenssl1_0_0-32bit-1.0.1i-27.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-hmac-1.0.1i-27.21.1">
      <FullProductName ProductID="libopenssl1_0_0-hmac-1.0.1i-27.21.1">libopenssl1_0_0-hmac-1.0.1i-27.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1">
      <FullProductName ProductID="libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1">libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-1.0.1i-27.21.1">
      <FullProductName ProductID="openssl-1.0.1i-27.21.1">openssl-1.0.1i-27.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-doc-1.0.1i-27.21.1">
      <FullProductName ProductID="openssl-doc-1.0.1i-27.21.1">openssl-doc-1.0.1i-27.21.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl1_0_0-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1">libopenssl1_0_0-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-32bit-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1">libopenssl1_0_0-32bit-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-hmac-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1">libopenssl1_0_0-hmac-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1">libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1">openssl-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-doc-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1">openssl-doc-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1">libopenssl1_0_0-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-32bit-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1">libopenssl1_0_0-32bit-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-hmac-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1">libopenssl1_0_0-hmac-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1">libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1">openssl-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-doc-1.0.1i-27.21.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1">openssl-doc-1.0.1i-27.21.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.</Note>
    </Notes>
    <CVE>CVE-2016-2177</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2177.html</URL>
        <Description>CVE-2016-2177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982575</URL>
        <Description>SUSE Bug 982575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999075</URL>
        <Description>SUSE Bug 999075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.</Note>
    </Notes>
    <CVE>CVE-2016-2178</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2178.html</URL>
        <Description>CVE-2016-2178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983249</URL>
        <Description>SUSE Bug 983249</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983519</URL>
        <Description>SUSE Bug 983519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.</Note>
    </Notes>
    <CVE>CVE-2016-2179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2179.html</URL>
        <Description>CVE-2016-2179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994844</URL>
        <Description>SUSE Bug 994844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.</Note>
    </Notes>
    <CVE>CVE-2016-2180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2180.html</URL>
        <Description>CVE-2016-2180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003811</URL>
        <Description>SUSE Bug 1003811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990419</URL>
        <Description>SUSE Bug 990419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.</Note>
    </Notes>
    <CVE>CVE-2016-2181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2181.html</URL>
        <Description>CVE-2016-2181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994749</URL>
        <Description>SUSE Bug 994749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994844</URL>
        <Description>SUSE Bug 994844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2182.html</URL>
        <Description>CVE-2016-2182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/993819</URL>
        <Description>SUSE Bug 993819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994844</URL>
        <Description>SUSE Bug 994844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995959</URL>
        <Description>SUSE Bug 995959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.</Note>
    </Notes>
    <CVE>CVE-2016-2183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2183.html</URL>
        <Description>CVE-2016-2183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001912</URL>
        <Description>SUSE Bug 1001912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027038</URL>
        <Description>SUSE Bug 1027038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034689</URL>
        <Description>SUSE Bug 1034689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056614</URL>
        <Description>SUSE Bug 1056614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171693</URL>
        <Description>SUSE Bug 1171693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994844</URL>
        <Description>SUSE Bug 994844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995359</URL>
        <Description>SUSE Bug 995359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.</Note>
    </Notes>
    <CVE>CVE-2016-6302</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6302.html</URL>
        <Description>CVE-2016-6302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994844</URL>
        <Description>SUSE Bug 994844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995324</URL>
        <Description>SUSE Bug 995324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-6303</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6303.html</URL>
        <Description>CVE-2016-6303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115893</URL>
        <Description>SUSE Bug 1115893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994844</URL>
        <Description>SUSE Bug 994844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995377</URL>
        <Description>SUSE Bug 995377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.</Note>
    </Notes>
    <CVE>CVE-2016-6304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6304.html</URL>
        <Description>CVE-2016-6304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001706</URL>
        <Description>SUSE Bug 1001706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003811</URL>
        <Description>SUSE Bug 1003811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005579</URL>
        <Description>SUSE Bug 1005579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021375</URL>
        <Description>SUSE Bug 1021375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999666</URL>
        <Description>SUSE Bug 999666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.</Note>
    </Notes>
    <CVE>CVE-2016-6306</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:libopenssl1_0_0-hmac-32bit-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-1.0.1i-27.21.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:openssl-doc-1.0.1i-27.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162387-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6306.html</URL>
        <Description>CVE-2016-6306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004104</URL>
        <Description>SUSE Bug 1004104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999668</URL>
        <Description>SUSE Bug 999668</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
