Upstream information

CVE-2017-3731 at MITRE

Description

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

SUSE information

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 4.96 4.30
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network Network
Access Complexity Low Medium
Authentication None None
Confidentiality Impact None None
Integrity Impact None None
Availability Impact Partial Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Access Vector Network
Access Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High

Note from the SUSE Security Team

This problem only affects openssl 1.0.1 and newer, older versions do not contain the affected code.

SUSE Bugzilla entries: 1021641 [RESOLVED / FIXED], 1022085 [RESOLVED / FIXED], 1025347 [CONFIRMED], 1025354 [RESOLVED / WORKSFORME]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Enterprise Storage 4
  • nodejs4 >= 4.7.3-14.1
Patchnames:
SUSE-Storage-4-2017-476
SUSE Linux Enterprise Desktop 12 SP1
  • libopenssl1_0_0 >= 1.0.1i-54.5.1
  • libopenssl1_0_0-32bit >= 1.0.1i-54.5.1
  • openssl >= 1.0.1i-54.5.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP1-2017-236
SUSE Linux Enterprise Desktop 12 SP2
  • libopenssl-devel >= 1.0.2j-59.1
  • libopenssl1_0_0 >= 1.0.2j-59.1
  • libopenssl1_0_0-32bit >= 1.0.2j-59.1
  • openssl >= 1.0.2j-59.1
Patchnames:
SUSE-SLE-DESKTOP-12-SP2-2017-228
SUSE Linux Enterprise Module for Web Scripting 12
  • nodejs4 >= 4.7.3-14.1
  • nodejs4-devel >= 4.7.3-14.1
  • nodejs4-docs >= 4.7.3-14.1
  • nodejs6 >= 6.9.5-7.1
  • nodejs6-devel >= 6.9.5-7.1
  • nodejs6-docs >= 6.9.5-7.1
  • npm4 >= 4.7.3-14.1
  • npm6 >= 6.9.5-7.1
Patchnames:
SUSE-SLE-Module-Web-Scripting-12-2017-221
SUSE-SLE-Module-Web-Scripting-12-2017-476
SUSE Linux Enterprise Server 11-SECURITY
  • libopenssl1-devel >= 1.0.1g-0.57.1
  • libopenssl1_0_0 >= 1.0.1g-0.57.1
  • libopenssl1_0_0-32bit >= 1.0.1g-0.57.1
  • libopenssl1_0_0-x86 >= 1.0.1g-0.57.1
  • openssl1 >= 1.0.1g-0.57.1
  • openssl1-doc >= 1.0.1g-0.57.1
Patchnames:
secsp3-openssl1-12991
SUSE Linux Enterprise Server 12 SP1
  • libopenssl1_0_0 >= 1.0.1i-54.5.1
  • libopenssl1_0_0-32bit >= 1.0.1i-54.5.1
  • libopenssl1_0_0-hmac >= 1.0.1i-54.5.1
  • libopenssl1_0_0-hmac-32bit >= 1.0.1i-54.5.1
  • openssl >= 1.0.1i-54.5.1
  • openssl-doc >= 1.0.1i-54.5.1
Patchnames:
SUSE-SLE-SERVER-12-SP1-2017-236
SUSE Linux Enterprise Server 12 SP2
  • libopenssl-devel >= 1.0.2j-59.1
  • libopenssl1_0_0 >= 1.0.2j-59.1
  • libopenssl1_0_0-32bit >= 1.0.2j-59.1
  • libopenssl1_0_0-hmac >= 1.0.2j-59.1
  • libopenssl1_0_0-hmac-32bit >= 1.0.2j-59.1
  • openssl >= 1.0.2j-59.1
  • openssl-doc >= 1.0.2j-59.1
Patchnames:
SUSE-SLE-SERVER-12-SP2-2017-228
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • libopenssl-devel >= 1.0.2j-59.1
  • libopenssl1_0_0 >= 1.0.2j-59.1
  • libopenssl1_0_0-hmac >= 1.0.2j-59.1
  • openssl >= 1.0.2j-59.1
  • openssl-doc >= 1.0.2j-59.1
Patchnames:
SUSE-SLE-RPI-12-SP2-2017-228
SUSE Linux Enterprise Software Development Kit 12 SP1
  • libopenssl-devel >= 1.0.1i-54.5.1
  • openssl >= 1.0.1i-54.5.1
Patchnames:
SUSE-SLE-SDK-12-SP1-2017-236
SUSE Linux Enterprise Software Development Kit 12 SP2
  • libopenssl-devel >= 1.0.2j-59.1
  • openssl >= 1.0.2j-59.1
Patchnames:
SUSE-SLE-SDK-12-SP2-2017-228
openSUSE Leap 42.1
  • libopenssl-devel >= 1.0.1i-21.1
  • libopenssl-devel-32bit >= 1.0.1i-21.1
  • libopenssl1_0_0 >= 1.0.1i-21.1
  • libopenssl1_0_0-32bit >= 1.0.1i-21.1
  • libopenssl1_0_0-debuginfo >= 1.0.1i-21.1
  • libopenssl1_0_0-debuginfo-32bit >= 1.0.1i-21.1
  • libopenssl1_0_0-hmac >= 1.0.1i-21.1
  • libopenssl1_0_0-hmac-32bit >= 1.0.1i-21.1
  • nodejs >= 4.7.3-39.1
  • nodejs-debuginfo >= 4.7.3-39.1
  • nodejs-debugsource >= 4.7.3-39.1
  • nodejs-devel >= 4.7.3-39.1
  • nodejs-docs >= 4.7.3-39.1
  • npm >= 4.7.3-39.1
  • openssl >= 1.0.1i-21.1
  • openssl-debuginfo >= 1.0.1i-21.1
  • openssl-debugsource >= 1.0.1i-21.1
  • openssl-doc >= 1.0.1i-21.1
Patchnames:
openSUSE-2017-255
openSUSE-2017-284
openSUSE Leap 42.2
  • libopenssl-devel >= 1.0.2j-4.1
  • libopenssl-devel-32bit >= 1.0.2j-4.1
  • libopenssl1_0_0 >= 1.0.2j-4.1
  • libopenssl1_0_0-32bit >= 1.0.2j-4.1
  • libopenssl1_0_0-debuginfo >= 1.0.2j-4.1
  • libopenssl1_0_0-debuginfo-32bit >= 1.0.2j-4.1
  • libopenssl1_0_0-hmac >= 1.0.2j-4.1
  • libopenssl1_0_0-hmac-32bit >= 1.0.2j-4.1
  • nodejs4 >= 4.7.3-5.3.1
  • nodejs4-debuginfo >= 4.7.3-5.3.1
  • nodejs4-debugsource >= 4.7.3-5.3.1
  • nodejs4-devel >= 4.7.3-5.3.1
  • nodejs4-docs >= 4.7.3-5.3.1
  • npm4 >= 4.7.3-5.3.1
  • openssl >= 1.0.2j-4.1
  • openssl-debuginfo >= 1.0.2j-4.1
  • openssl-debugsource >= 1.0.2j-4.1
  • openssl-doc >= 1.0.2j-4.1
Patchnames:
openSUSE-2017-256
openSUSE-2017-442