{"affected":[{"ecosystem_specific":{"binaries":[{"libopenssl-3-devel":"3.1.4-7.1","libopenssl-3-fips-provider":"3.1.4-7.1","libopenssl3":"3.1.4-7.1","openssl-3":"3.1.4-7.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"openssl-3","purl":"pkg:rpm/suse/openssl-3&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.1.4-7.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openssl-3 fixes the following issues:\n\n- CVE-2024-41996: Fixed a denial of service in the Diffie-Hellman Key Agreement Protocol (bsc#1230698).\n- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)\n","id":"SUSE-SU-2025:20081-1","modified":"2025-02-03T09:06:00Z","published":"2025-02-03T09:06:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520081-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-50782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41996"}],"related":["CVE-2023-50782","CVE-2024-41996"],"summary":"Security update for openssl-3","upstream":["CVE-2023-50782","CVE-2024-41996"]}