<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssl-1_1</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:2410-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-09-20T07:51:56Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-09-20T07:51:56Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-09-20T07:51:56Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssl-1_1</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openssl-1_1 fixes the following issues:

OpenSSL Security Advisory [10 September 2019]

* CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
* CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/sle15:15.0-2019-2410,SUSE-2019-2410,SUSE-SLE-Module-Basesystem-15-2019-2410,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2410</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192410-1/</URL>
      <Description>Link for SUSE-SU-2019:2410-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:2410-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150003</URL>
      <Description>SUSE Bug 1150003</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150250</URL>
      <Description>SUSE Bug 1150250</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1547/</URL>
      <Description>SUSE CVE CVE-2019-1547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1563/</URL>
      <Description>SUSE CVE CVE-2019-1563 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/sle15:15.0">
      <Branch Type="Product Name" Name="Container suse/sle15:15.0">
        <FullProductName ProductID="Container suse/sle15:15.0">Container suse/sle15:15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15" CPE="cpe:/o:suse:sle-module-basesystem:15">SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_1-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl1_1-1.1.0i-4.24.1">libopenssl1_1-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-1_1-1.1.0i-4.24.1">
      <FullProductName ProductID="openssl-1_1-1.1.0i-4.24.1">openssl-1_1-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-1_1-devel-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl-1_1-devel-1.1.0i-4.24.1">libopenssl-1_1-devel-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-1_1-devel-32bit-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl-1_1-devel-32bit-1.1.0i-4.24.1">libopenssl-1_1-devel-32bit-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-1_1-devel-64bit-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl-1_1-devel-64bit-1.1.0i-4.24.1">libopenssl-1_1-devel-64bit-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_1-32bit-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl1_1-32bit-1.1.0i-4.24.1">libopenssl1_1-32bit-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_1-64bit-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl1_1-64bit-1.1.0i-4.24.1">libopenssl1_1-64bit-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_1-hmac-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl1_1-hmac-1.1.0i-4.24.1">libopenssl1_1-hmac-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_1-hmac-32bit-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl1_1-hmac-32bit-1.1.0i-4.24.1">libopenssl1_1-hmac-32bit-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl1_1-hmac-64bit-1.1.0i-4.24.1">
      <FullProductName ProductID="libopenssl1_1-hmac-64bit-1.1.0i-4.24.1">libopenssl1_1-hmac-64bit-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-1_1-doc-1.1.0i-4.24.1">
      <FullProductName ProductID="openssl-1_1-doc-1.1.0i-4.24.1">openssl-1_1-doc-1.1.0i-4.24.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl1_1-1.1.0i-4.24.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle15:15.0">
      <FullProductName ProductID="Container suse/sle15:15.0:libopenssl1_1-1.1.0i-4.24.1">libopenssl1_1-1.1.0i-4.24.1 as a component of Container suse/sle15:15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-1_1-1.1.0i-4.24.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle15:15.0">
      <FullProductName ProductID="Container suse/sle15:15.0:openssl-1_1-1.1.0i-4.24.1">openssl-1_1-1.1.0i-4.24.1 as a component of Container suse/sle15:15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-1_1-devel-1.1.0i-4.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0i-4.24.1">libopenssl-1_1-devel-1.1.0i-4.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_1-1.1.0i-4.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0i-4.24.1">libopenssl1_1-1.1.0i-4.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_1-32bit-1.1.0i-4.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-32bit-1.1.0i-4.24.1">libopenssl1_1-32bit-1.1.0i-4.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_1-hmac-1.1.0i-4.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0i-4.24.1">libopenssl1_1-hmac-1.1.0i-4.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl1_1-hmac-32bit-1.1.0i-4.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-32bit-1.1.0i-4.24.1">libopenssl1_1-hmac-32bit-1.1.0i-4.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-1_1-1.1.0i-4.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0i-4.24.1">openssl-1_1-1.1.0i-4.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).</Note>
    </Notes>
    <CVE>CVE-2019-1547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle15:15.0:libopenssl1_1-1.1.0i-4.24.1</ProductID>
        <ProductID>Container suse/sle15:15.0:openssl-1_1-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-32bit-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-32bit-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0i-4.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192410-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1547.html</URL>
        <Description>CVE-2019-1547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150003</URL>
        <Description>SUSE Bug 1150003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154162</URL>
        <Description>SUSE Bug 1154162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154166</URL>
        <Description>SUSE Bug 1154166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156430</URL>
        <Description>SUSE Bug 1156430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161085</URL>
        <Description>SUSE Bug 1161085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205621</URL>
        <Description>SUSE Bug 1205621</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).</Note>
    </Notes>
    <CVE>CVE-2019-1563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle15:15.0:libopenssl1_1-1.1.0i-4.24.1</ProductID>
        <ProductID>Container suse/sle15:15.0:openssl-1_1-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl-1_1-devel-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-32bit-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libopenssl1_1-hmac-32bit-1.1.0i-4.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:openssl-1_1-1.1.0i-4.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20192410-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1563.html</URL>
        <Description>CVE-2019-1563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150250</URL>
        <Description>SUSE Bug 1150250</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1154162</URL>
        <Description>SUSE Bug 1154162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156430</URL>
        <Description>SUSE Bug 1156430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205621</URL>
        <Description>SUSE Bug 1205621</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
