<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for OpenSSL</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:0545-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2014-10-24T22:07:03Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2014-10-24T22:07:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2014-10-24T22:07:03Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for OpenSSL</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This OpenSSL update fixes the following issues:

    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp3-libopenssl-devel,sledsp3-libopenssl-devel,sleman17sp2-libopenssl-devel,slessp3-libopenssl-devel,slestso13-libopenssl-devel</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      <Description>Link for SUSE-SU-2015:0545-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:0545-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/859228</URL>
      <Description>SUSE Bug 859228</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/859924</URL>
      <Description>SUSE Bug 859924</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/860332</URL>
      <Description>SUSE Bug 860332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/862181</URL>
      <Description>SUSE Bug 862181</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/870192</URL>
      <Description>SUSE Bug 870192</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/879179</URL>
      <Description>SUSE Bug 879179</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/890764</URL>
      <Description>SUSE Bug 890764</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/890767</URL>
      <Description>SUSE Bug 890767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/890768</URL>
      <Description>SUSE Bug 890768</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/890769</URL>
      <Description>SUSE Bug 890769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/890770</URL>
      <Description>SUSE Bug 890770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/901223</URL>
      <Description>SUSE Bug 901223</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/901277</URL>
      <Description>SUSE Bug 901277</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/912014</URL>
      <Description>SUSE Bug 912014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/912015</URL>
      <Description>SUSE Bug 912015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/912018</URL>
      <Description>SUSE Bug 912018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/912293</URL>
      <Description>SUSE Bug 912293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/912294</URL>
      <Description>SUSE Bug 912294</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/912296</URL>
      <Description>SUSE Bug 912296</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/915976</URL>
      <Description>SUSE Bug 915976</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/919648</URL>
      <Description>SUSE Bug 919648</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/920236</URL>
      <Description>SUSE Bug 920236</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/922488</URL>
      <Description>SUSE Bug 922488</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/922496</URL>
      <Description>SUSE Bug 922496</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/922499</URL>
      <Description>SUSE Bug 922499</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/922500</URL>
      <Description>SUSE Bug 922500</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/922501</URL>
      <Description>SUSE Bug 922501</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/929678</URL>
      <Description>SUSE Bug 929678</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/931698</URL>
      <Description>SUSE Bug 931698</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/933898</URL>
      <Description>SUSE Bug 933898</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/933911</URL>
      <Description>SUSE Bug 933911</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/934487</URL>
      <Description>SUSE Bug 934487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/934489</URL>
      <Description>SUSE Bug 934489</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/934491</URL>
      <Description>SUSE Bug 934491</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/934493</URL>
      <Description>SUSE Bug 934493</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-5146/</URL>
      <Description>SUSE CVE CVE-2009-5146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0076/</URL>
      <Description>SUSE CVE CVE-2014-0076 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0221/</URL>
      <Description>SUSE CVE CVE-2014-0221 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0224/</URL>
      <Description>SUSE CVE CVE-2014-0224 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3470/</URL>
      <Description>SUSE CVE CVE-2014-3470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3505/</URL>
      <Description>SUSE CVE CVE-2014-3505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3506/</URL>
      <Description>SUSE CVE CVE-2014-3506 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3507/</URL>
      <Description>SUSE CVE CVE-2014-3507 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3508/</URL>
      <Description>SUSE CVE CVE-2014-3508 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3510/</URL>
      <Description>SUSE CVE CVE-2014-3510 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3566/</URL>
      <Description>SUSE CVE CVE-2014-3566 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3567/</URL>
      <Description>SUSE CVE CVE-2014-3567 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3568/</URL>
      <Description>SUSE CVE CVE-2014-3568 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3570/</URL>
      <Description>SUSE CVE CVE-2014-3570 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3571/</URL>
      <Description>SUSE CVE CVE-2014-3571 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3572/</URL>
      <Description>SUSE CVE CVE-2014-3572 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8275/</URL>
      <Description>SUSE CVE CVE-2014-8275 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0204/</URL>
      <Description>SUSE CVE CVE-2015-0204 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0205/</URL>
      <Description>SUSE CVE CVE-2015-0205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0209/</URL>
      <Description>SUSE CVE CVE-2015-0209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0286/</URL>
      <Description>SUSE CVE CVE-2015-0286 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0287/</URL>
      <Description>SUSE CVE CVE-2015-0287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0288/</URL>
      <Description>SUSE CVE CVE-2015-0288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0289/</URL>
      <Description>SUSE CVE CVE-2015-0289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0292/</URL>
      <Description>SUSE CVE CVE-2015-0292 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0293/</URL>
      <Description>SUSE CVE CVE-2015-0293 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1788/</URL>
      <Description>SUSE CVE CVE-2015-1788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1789/</URL>
      <Description>SUSE CVE CVE-2015-1789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1790/</URL>
      <Description>SUSE CVE CVE-2015-1790 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1791/</URL>
      <Description>SUSE CVE CVE-2015-1791 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1792/</URL>
      <Description>SUSE CVE CVE-2015-1792 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3216/</URL>
      <Description>SUSE CVE CVE-2015-3216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4000/</URL>
      <Description>SUSE CVE CVE-2015-4000 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3" CPE="cpe:/o:suse:suse_sled:11:sp3">SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3" CPE="cpe:/o:suse:suse_sles:11:sp3">SUSE Linux Enterprise Server 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3" CPE="cpe:/o:suse:sles_sap:11:sp3">SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3" CPE="cpe:/a:suse:sle-sdk:11:sp3">SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager 1.7">
      <Branch Type="Product Name" Name="SUSE Manager 1.7">
        <FullProductName ProductID="SUSE Manager 1.7" CPE="cpe:/o:suse:suse-manager-server:1.7">SUSE Manager 1.7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Studio Onsite 1.3">
      <Branch Type="Product Name" Name="SUSE Studio Onsite 1.3">
        <FullProductName ProductID="SUSE Studio Onsite 1.3" CPE="cpe:/o:suse:sle-studioonsite:1.3">SUSE Studio Onsite 1.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-devel-0.9.8j-0.66.1">
      <FullProductName ProductID="libopenssl-devel-0.9.8j-0.66.1">libopenssl-devel-0.9.8j-0.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl0_9_8-0.9.8j-0.66.1">
      <FullProductName ProductID="libopenssl0_9_8-0.9.8j-0.66.1">libopenssl0_9_8-0.9.8j-0.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl0_9_8-32bit-0.9.8j-0.66.1">
      <FullProductName ProductID="libopenssl0_9_8-32bit-0.9.8j-0.66.1">libopenssl0_9_8-32bit-0.9.8j-0.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-0.9.8j-0.66.1">
      <FullProductName ProductID="openssl-0.9.8j-0.66.1">openssl-0.9.8j-0.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl0_9_8-hmac-0.9.8j-0.66.1">
      <FullProductName ProductID="libopenssl0_9_8-hmac-0.9.8j-0.66.1">libopenssl0_9_8-hmac-0.9.8j-0.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1">
      <FullProductName ProductID="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1">libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-doc-0.9.8j-0.66.1">
      <FullProductName ProductID="openssl-doc-0.9.8j-0.66.1">openssl-doc-0.9.8j-0.66.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl0_9_8-x86-0.9.8j-0.66.1">
      <FullProductName ProductID="libopenssl0_9_8-x86-0.9.8j-0.66.1">libopenssl0_9_8-x86-0.9.8j-0.66.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl0_9_8-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1">libopenssl0_9_8-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1">libopenssl0_9_8-32bit-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1">openssl-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Desktop 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1">libopenssl0_9_8-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1">libopenssl0_9_8-32bit-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-hmac-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1">libopenssl0_9_8-hmac-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1">libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-x86-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1">libopenssl0_9_8-x86-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1">openssl-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-doc-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1">openssl-doc-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1">libopenssl0_9_8-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1">libopenssl0_9_8-32bit-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-hmac-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1">libopenssl0_9_8-hmac-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1">libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-x86-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1">libopenssl0_9_8-x86-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1">openssl-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-doc-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1">openssl-doc-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1">libopenssl0_9_8-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1">libopenssl0_9_8-32bit-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-hmac-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1">libopenssl0_9_8-hmac-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1">libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-x86-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1">libopenssl0_9_8-x86-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1">openssl-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-doc-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1">openssl-doc-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-devel-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1">libopenssl-devel-0.9.8j-0.66.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 1.7">
      <FullProductName ProductID="SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1">libopenssl0_9_8-0.9.8j-0.66.1 as a component of SUSE Manager 1.7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 1.7">
      <FullProductName ProductID="SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1">libopenssl0_9_8-32bit-0.9.8j-0.66.1 as a component of SUSE Manager 1.7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-hmac-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 1.7">
      <FullProductName ProductID="SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1">libopenssl0_9_8-hmac-0.9.8j-0.66.1 as a component of SUSE Manager 1.7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 1.7">
      <FullProductName ProductID="SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1">libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1 as a component of SUSE Manager 1.7</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 1.7">
      <FullProductName ProductID="SUSE Manager 1.7:openssl-0.9.8j-0.66.1">openssl-0.9.8j-0.66.1 as a component of SUSE Manager 1.7</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-doc-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 1.7">
      <FullProductName ProductID="SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1">openssl-doc-0.9.8j-0.66.1 as a component of SUSE Manager 1.7</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-devel-0.9.8j-0.66.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite 1.3">
      <FullProductName ProductID="SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1">libopenssl-devel-0.9.8j-0.66.1 as a component of SUSE Studio Onsite 1.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none</Note>
    </Notes>
    <CVE>CVE-2009-5146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-5146.html</URL>
        <Description>CVE-2009-5146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915976</URL>
        <Description>SUSE Bug 915976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922647</URL>
        <Description>SUSE Bug 922647</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.</Note>
    </Notes>
    <CVE>CVE-2014-0076</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0076.html</URL>
        <Description>CVE-2014-0076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/869945</URL>
        <Description>SUSE Bug 869945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880891</URL>
        <Description>SUSE Bug 880891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/883126</URL>
        <Description>SUSE Bug 883126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885777</URL>
        <Description>SUSE Bug 885777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.</Note>
    </Notes>
    <CVE>CVE-2014-0221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0221.html</URL>
        <Description>CVE-2014-0221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880891</URL>
        <Description>SUSE Bug 880891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/883126</URL>
        <Description>SUSE Bug 883126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885777</URL>
        <Description>SUSE Bug 885777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915913</URL>
        <Description>SUSE Bug 915913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2014-0224</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0224.html</URL>
        <Description>CVE-2014-0224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146657</URL>
        <Description>SUSE Bug 1146657</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880891</URL>
        <Description>SUSE Bug 880891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/881743</URL>
        <Description>SUSE Bug 881743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/883126</URL>
        <Description>SUSE Bug 883126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885777</URL>
        <Description>SUSE Bug 885777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/892403</URL>
        <Description>SUSE Bug 892403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901237</URL>
        <Description>SUSE Bug 901237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903703</URL>
        <Description>SUSE Bug 903703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905018</URL>
        <Description>SUSE Bug 905018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914447</URL>
        <Description>SUSE Bug 914447</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915913</URL>
        <Description>SUSE Bug 915913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916239</URL>
        <Description>SUSE Bug 916239</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.</Note>
    </Notes>
    <CVE>CVE-2014-3470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3470.html</URL>
        <Description>CVE-2014-3470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/880891</URL>
        <Description>SUSE Bug 880891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/883126</URL>
        <Description>SUSE Bug 883126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885777</URL>
        <Description>SUSE Bug 885777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915913</URL>
        <Description>SUSE Bug 915913</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.</Note>
    </Notes>
    <CVE>CVE-2014-3505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3505.html</URL>
        <Description>CVE-2014-3505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890759</URL>
        <Description>SUSE Bug 890759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890764</URL>
        <Description>SUSE Bug 890764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890767</URL>
        <Description>SUSE Bug 890767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.</Note>
    </Notes>
    <CVE>CVE-2014-3506</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3506.html</URL>
        <Description>CVE-2014-3506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890759</URL>
        <Description>SUSE Bug 890759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890764</URL>
        <Description>SUSE Bug 890764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890768</URL>
        <Description>SUSE Bug 890768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.</Note>
    </Notes>
    <CVE>CVE-2014-3507</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3507.html</URL>
        <Description>CVE-2014-3507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890759</URL>
        <Description>SUSE Bug 890759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890764</URL>
        <Description>SUSE Bug 890764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890769</URL>
        <Description>SUSE Bug 890769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.</Note>
    </Notes>
    <CVE>CVE-2014-3508</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3508.html</URL>
        <Description>CVE-2014-3508</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890759</URL>
        <Description>SUSE Bug 890759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890764</URL>
        <Description>SUSE Bug 890764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950708</URL>
        <Description>SUSE Bug 950708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.</Note>
    </Notes>
    <CVE>CVE-2014-3510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3510.html</URL>
        <Description>CVE-2014-3510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890759</URL>
        <Description>SUSE Bug 890759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890764</URL>
        <Description>SUSE Bug 890764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/890770</URL>
        <Description>SUSE Bug 890770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.</Note>
    </Notes>
    <CVE>CVE-2014-3566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3566.html</URL>
        <Description>CVE-2014-3566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011293</URL>
        <Description>SUSE Bug 1011293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031023</URL>
        <Description>SUSE Bug 1031023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901223</URL>
        <Description>SUSE Bug 901223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901254</URL>
        <Description>SUSE Bug 901254</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901277</URL>
        <Description>SUSE Bug 901277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901748</URL>
        <Description>SUSE Bug 901748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901757</URL>
        <Description>SUSE Bug 901757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901759</URL>
        <Description>SUSE Bug 901759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901889</URL>
        <Description>SUSE Bug 901889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901968</URL>
        <Description>SUSE Bug 901968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902229</URL>
        <Description>SUSE Bug 902229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902233</URL>
        <Description>SUSE Bug 902233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902476</URL>
        <Description>SUSE Bug 902476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903405</URL>
        <Description>SUSE Bug 903405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903684</URL>
        <Description>SUSE Bug 903684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/904889</URL>
        <Description>SUSE Bug 904889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914041</URL>
        <Description>SUSE Bug 914041</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994144</URL>
        <Description>SUSE Bug 994144</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.</Note>
    </Notes>
    <CVE>CVE-2014-3567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3567.html</URL>
        <Description>CVE-2014-3567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/877506</URL>
        <Description>SUSE Bug 877506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901277</URL>
        <Description>SUSE Bug 901277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.</Note>
    </Notes>
    <CVE>CVE-2014-3568</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3568.html</URL>
        <Description>CVE-2014-3568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/901277</URL>
        <Description>SUSE Bug 901277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905106</URL>
        <Description>SUSE Bug 905106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/911399</URL>
        <Description>SUSE Bug 911399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986238</URL>
        <Description>SUSE Bug 986238</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.</Note>
    </Notes>
    <CVE>CVE-2014-3570</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3570.html</URL>
        <Description>CVE-2014-3570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912296</URL>
        <Description>SUSE Bug 912296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915848</URL>
        <Description>SUSE Bug 915848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944456</URL>
        <Description>SUSE Bug 944456</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.</Note>
    </Notes>
    <CVE>CVE-2014-3571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3571.html</URL>
        <Description>CVE-2014-3571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912294</URL>
        <Description>SUSE Bug 912294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915848</URL>
        <Description>SUSE Bug 915848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.</Note>
    </Notes>
    <CVE>CVE-2014-3572</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3572.html</URL>
        <Description>CVE-2014-3572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912015</URL>
        <Description>SUSE Bug 912015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915848</URL>
        <Description>SUSE Bug 915848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.</Note>
    </Notes>
    <CVE>CVE-2014-8275</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8275.html</URL>
        <Description>CVE-2014-8275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912018</URL>
        <Description>SUSE Bug 912018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915848</URL>
        <Description>SUSE Bug 915848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.</Note>
    </Notes>
    <CVE>CVE-2015-0204</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0204.html</URL>
        <Description>CVE-2015-0204</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912014</URL>
        <Description>SUSE Bug 912014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920482</URL>
        <Description>SUSE Bug 920482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920484</URL>
        <Description>SUSE Bug 920484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927591</URL>
        <Description>SUSE Bug 927591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936787</URL>
        <Description>SUSE Bug 936787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952088</URL>
        <Description>SUSE Bug 952088</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.</Note>
    </Notes>
    <CVE>CVE-2015-0205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0205.html</URL>
        <Description>CVE-2015-0205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912293</URL>
        <Description>SUSE Bug 912293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/915848</URL>
        <Description>SUSE Bug 915848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927623</URL>
        <Description>SUSE Bug 927623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.</Note>
    </Notes>
    <CVE>CVE-2015-0209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0209.html</URL>
        <Description>CVE-2015-0209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912014</URL>
        <Description>SUSE Bug 912014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.</Note>
    </Notes>
    <CVE>CVE-2015-0286</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0286.html</URL>
        <Description>CVE-2015-0286</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912014</URL>
        <Description>SUSE Bug 912014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922496</URL>
        <Description>SUSE Bug 922496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.</Note>
    </Notes>
    <CVE>CVE-2015-0287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0287.html</URL>
        <Description>CVE-2015-0287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912014</URL>
        <Description>SUSE Bug 912014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922499</URL>
        <Description>SUSE Bug 922499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968888</URL>
        <Description>SUSE Bug 968888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991722</URL>
        <Description>SUSE Bug 991722</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.</Note>
    </Notes>
    <CVE>CVE-2015-0288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0288.html</URL>
        <Description>CVE-2015-0288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912014</URL>
        <Description>SUSE Bug 912014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920236</URL>
        <Description>SUSE Bug 920236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.</Note>
    </Notes>
    <CVE>CVE-2015-0289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0289.html</URL>
        <Description>CVE-2015-0289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912014</URL>
        <Description>SUSE Bug 912014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922500</URL>
        <Description>SUSE Bug 922500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2015-0292</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0292.html</URL>
        <Description>CVE-2015-0292</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912014</URL>
        <Description>SUSE Bug 912014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922501</URL>
        <Description>SUSE Bug 922501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.</Note>
    </Notes>
    <CVE>CVE-2015-0293</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0293.html</URL>
        <Description>CVE-2015-0293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912014</URL>
        <Description>SUSE Bug 912014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919648</URL>
        <Description>SUSE Bug 919648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922488</URL>
        <Description>SUSE Bug 922488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968044</URL>
        <Description>SUSE Bug 968044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968051</URL>
        <Description>SUSE Bug 968051</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968053</URL>
        <Description>SUSE Bug 968053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986238</URL>
        <Description>SUSE Bug 986238</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.</Note>
    </Notes>
    <CVE>CVE-2015-1788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1788.html</URL>
        <Description>CVE-2015-1788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934487</URL>
        <Description>SUSE Bug 934487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934666</URL>
        <Description>SUSE Bug 934666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.</Note>
    </Notes>
    <CVE>CVE-2015-1789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1789.html</URL>
        <Description>CVE-2015-1789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934489</URL>
        <Description>SUSE Bug 934489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934666</URL>
        <Description>SUSE Bug 934666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951391</URL>
        <Description>SUSE Bug 951391</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.</Note>
    </Notes>
    <CVE>CVE-2015-1790</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1790.html</URL>
        <Description>CVE-2015-1790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934491</URL>
        <Description>SUSE Bug 934491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934666</URL>
        <Description>SUSE Bug 934666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936586</URL>
        <Description>SUSE Bug 936586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.</Note>
    </Notes>
    <CVE>CVE-2015-1791</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1791.html</URL>
        <Description>CVE-2015-1791</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933911</URL>
        <Description>SUSE Bug 933911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934666</URL>
        <Description>SUSE Bug 934666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986238</URL>
        <Description>SUSE Bug 986238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989464</URL>
        <Description>SUSE Bug 989464</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.</Note>
    </Notes>
    <CVE>CVE-2015-1792</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1792.html</URL>
        <Description>CVE-2015-1792</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934493</URL>
        <Description>SUSE Bug 934493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934666</URL>
        <Description>SUSE Bug 934666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937891</URL>
        <Description>SUSE Bug 937891</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986238</URL>
        <Description>SUSE Bug 986238</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.</Note>
    </Notes>
    <CVE>CVE-2015-3216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3216.html</URL>
        <Description>CVE-2015-3216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/933898</URL>
        <Description>SUSE Bug 933898</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.</Note>
    </Notes>
    <CVE>CVE-2015-4000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:libopenssl0_9_8-x86-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Manager 1.7:openssl-doc-0.9.8j-0.66.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.66.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.3</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150545-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4000.html</URL>
        <Description>CVE-2015-4000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074631</URL>
        <Description>SUSE Bug 1074631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211968</URL>
        <Description>SUSE Bug 1211968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931600</URL>
        <Description>SUSE Bug 931600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931698</URL>
        <Description>SUSE Bug 931698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931723</URL>
        <Description>SUSE Bug 931723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931845</URL>
        <Description>SUSE Bug 931845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932026</URL>
        <Description>SUSE Bug 932026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932483</URL>
        <Description>SUSE Bug 932483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934789</URL>
        <Description>SUSE Bug 934789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935033</URL>
        <Description>SUSE Bug 935033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935540</URL>
        <Description>SUSE Bug 935540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935979</URL>
        <Description>SUSE Bug 935979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937202</URL>
        <Description>SUSE Bug 937202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937766</URL>
        <Description>SUSE Bug 937766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938905</URL>
        <Description>SUSE Bug 938905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938906</URL>
        <Description>SUSE Bug 938906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938913</URL>
        <Description>SUSE Bug 938913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938945</URL>
        <Description>SUSE Bug 938945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943664</URL>
        <Description>SUSE Bug 943664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944729</URL>
        <Description>SUSE Bug 944729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945582</URL>
        <Description>SUSE Bug 945582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955589</URL>
        <Description>SUSE Bug 955589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980406</URL>
        <Description>SUSE Bug 980406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990592</URL>
        <Description>SUSE Bug 990592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994144</URL>
        <Description>SUSE Bug 994144</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
