Upstream information

CVE-2017-3737 at MITRE

Description

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 4.3 5.4
Vector AV:N/AC:M/Au:N/C:P/I:N/A:N AV:N/AC:H/Au:N/C:C/I:N/A:N
Access Vector Network Network
Access Complexity Medium High
Authentication None None
Confidentiality Impact Partial Complete
Integrity Impact None None
Availability Impact None None
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 5.9 5.9
Vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Access Vector Network Network
Access Complexity High High
Privileges Required None None
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact High High
Integrity Impact None None
Availability Impact None None
SUSE Bugzilla entries: 1071905 [RESOLVED / FIXED], 1072322 [RESOLVED / FIXED], 1076369 [RESOLVED / FIXED], 1089987 [IN_PROGRESS], 1089997 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Openstack Cloud Magnum Orchestration 7
  • libopenssl1_0_0 >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
Patchnames:
SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-2097
SUSE CaaS Platform ALL
  • libopenssl1_0_0 >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
  • sles12-caasp-dex-image >= 2.0.0-3.3.11
  • sles12-dnsmasq-nanny-image >= 2.0.1-2.3.15
  • sles12-haproxy-image >= 2.0.1-2.3.16
  • sles12-kubedns-image >= 2.0.1-2.3.11
  • sles12-mariadb-image >= 2.0.1-2.3.15
  • sles12-openldap-image >= 2.0.0-2.3.11
  • sles12-pause-image >= 2.0.1-2.3.9
  • sles12-pv-recycler-node-image >= 2.0.1-2.3.10
  • sles12-salt-api-image >= 2.0.1-2.3.10
  • sles12-salt-master-image >= 2.0.1-2.3.10
  • sles12-salt-minion-image >= 2.0.1-2.3.14
  • sles12-sidecar-image >= 2.0.1-2.3.11
  • sles12-tiller-image >= 2.0.0-2.3.11
  • sles12-velum-image >= 2.0.1-2.3.13
Patchnames:
SUSE-CAASP-ALL-2017-2097
SUSE-CAASP-ALL-2018-40
SUSE Linux Enterprise Desktop 12 SP2
  • libopenssl-devel >= 1.0.2j-60.20.2
  • libopenssl1_0_0 >= 1.0.2j-60.20.2
  • libopenssl1_0_0-32bit >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
Patchnames:
SUSE-SLE-DESKTOP-12-SP2-2017-2097
SUSE Linux Enterprise Desktop 12 SP3
  • libopenssl-devel >= 1.0.2j-60.20.2
  • libopenssl1_0_0 >= 1.0.2j-60.20.2
  • libopenssl1_0_0-32bit >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
Patchnames:
SUSE-SLE-DESKTOP-12-SP3-2017-2097
SUSE Linux Enterprise Server 12 SP2
  • libopenssl-devel >= 1.0.2j-60.20.2
  • libopenssl1_0_0 >= 1.0.2j-60.20.2
  • libopenssl1_0_0-32bit >= 1.0.2j-60.20.2
  • libopenssl1_0_0-hmac >= 1.0.2j-60.20.2
  • libopenssl1_0_0-hmac-32bit >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
  • openssl-doc >= 1.0.2j-60.20.2
Patchnames:
SUSE-SLE-SERVER-12-SP2-2017-2097
SUSE Linux Enterprise Server 12 SP3
  • libopenssl-devel >= 1.0.2j-60.20.2
  • libopenssl1_0_0 >= 1.0.2j-60.20.2
  • libopenssl1_0_0-32bit >= 1.0.2j-60.20.2
  • libopenssl1_0_0-hmac >= 1.0.2j-60.20.2
  • libopenssl1_0_0-hmac-32bit >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
  • openssl-doc >= 1.0.2j-60.20.2
Patchnames:
SUSE-SLE-SERVER-12-SP3-2017-2097
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • libopenssl-devel >= 1.0.2j-60.20.2
  • libopenssl1_0_0 >= 1.0.2j-60.20.2
  • libopenssl1_0_0-hmac >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
  • openssl-doc >= 1.0.2j-60.20.2
Patchnames:
SUSE-SLE-RPI-12-SP2-2017-2097
SUSE Linux Enterprise Software Development Kit 12 SP2
  • libopenssl-devel >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
Patchnames:
SUSE-SLE-SDK-12-SP2-2017-2097
SUSE Linux Enterprise Software Development Kit 12 SP3
  • libopenssl-devel >= 1.0.2j-60.20.2
  • openssl >= 1.0.2j-60.20.2
Patchnames:
SUSE-SLE-SDK-12-SP3-2017-2097
openSUSE Leap 15.0
  • libopenssl1_0_0 >= 1.0.2n-lp150.1.25
Patchnames:
openSUSE Leap 15.0 GA libopenssl1_0_0
openSUSE Leap 42.2
  • libmysql56client18 >= 5.6.39-24.15.1
  • libmysql56client18-32bit >= 5.6.39-24.15.1
  • libmysql56client18-debuginfo >= 5.6.39-24.15.1
  • libmysql56client18-debuginfo-32bit >= 5.6.39-24.15.1
  • libmysql56client_r18 >= 5.6.39-24.15.1
  • libmysql56client_r18-32bit >= 5.6.39-24.15.1
  • libopenssl-devel >= 1.0.2j-6.9.1
  • libopenssl-devel-32bit >= 1.0.2j-6.9.1
  • libopenssl1_0_0 >= 1.0.2j-6.9.1
  • libopenssl1_0_0-32bit >= 1.0.2j-6.9.1
  • libopenssl1_0_0-debuginfo >= 1.0.2j-6.9.1
  • libopenssl1_0_0-debuginfo-32bit >= 1.0.2j-6.9.1
  • libopenssl1_0_0-hmac >= 1.0.2j-6.9.1
  • libopenssl1_0_0-hmac-32bit >= 1.0.2j-6.9.1
  • mysql-community-server >= 5.6.39-24.15.1
  • mysql-community-server-bench >= 5.6.39-24.15.1
  • mysql-community-server-bench-debuginfo >= 5.6.39-24.15.1
  • mysql-community-server-client >= 5.6.39-24.15.1
  • mysql-community-server-client-debuginfo >= 5.6.39-24.15.1
  • mysql-community-server-debuginfo >= 5.6.39-24.15.1
  • mysql-community-server-debugsource >= 5.6.39-24.15.1
  • mysql-community-server-errormessages >= 5.6.39-24.15.1
  • mysql-community-server-test >= 5.6.39-24.15.1
  • mysql-community-server-test-debuginfo >= 5.6.39-24.15.1
  • mysql-community-server-tools >= 5.6.39-24.15.1
  • mysql-community-server-tools-debuginfo >= 5.6.39-24.15.1
  • openssl >= 1.0.2j-6.9.1
  • openssl-cavs >= 1.0.2j-6.9.1
  • openssl-cavs-debuginfo >= 1.0.2j-6.9.1
  • openssl-debuginfo >= 1.0.2j-6.9.1
  • openssl-debugsource >= 1.0.2j-6.9.1
  • openssl-doc >= 1.0.2j-6.9.1
Patchnames:
openSUSE-2017-1381
openSUSE-2018-90
openSUSE Leap 42.3
  • libmysql56client18 >= 5.6.39-33.1
  • libmysql56client18-32bit >= 5.6.39-33.1
  • libmysql56client18-debuginfo >= 5.6.39-33.1
  • libmysql56client18-debuginfo-32bit >= 5.6.39-33.1
  • libmysql56client_r18 >= 5.6.39-33.1
  • libmysql56client_r18-32bit >= 5.6.39-33.1
  • libopenssl-devel >= 1.0.2j-16.1
  • libopenssl-devel-32bit >= 1.0.2j-16.1
  • libopenssl1_0_0 >= 1.0.2j-16.1
  • libopenssl1_0_0-32bit >= 1.0.2j-16.1
  • libopenssl1_0_0-debuginfo >= 1.0.2j-16.1
  • libopenssl1_0_0-debuginfo-32bit >= 1.0.2j-16.1
  • libopenssl1_0_0-hmac >= 1.0.2j-16.1
  • libopenssl1_0_0-hmac-32bit >= 1.0.2j-16.1
  • mysql-community-server >= 5.6.39-33.1
  • mysql-community-server-bench >= 5.6.39-33.1
  • mysql-community-server-bench-debuginfo >= 5.6.39-33.1
  • mysql-community-server-client >= 5.6.39-33.1
  • mysql-community-server-client-debuginfo >= 5.6.39-33.1
  • mysql-community-server-debuginfo >= 5.6.39-33.1
  • mysql-community-server-debugsource >= 5.6.39-33.1
  • mysql-community-server-errormessages >= 5.6.39-33.1
  • mysql-community-server-test >= 5.6.39-33.1
  • mysql-community-server-test-debuginfo >= 5.6.39-33.1
  • mysql-community-server-tools >= 5.6.39-33.1
  • mysql-community-server-tools-debuginfo >= 5.6.39-33.1
  • openssl >= 1.0.2j-16.1
  • openssl-cavs >= 1.0.2j-16.1
  • openssl-cavs-debuginfo >= 1.0.2j-16.1
  • openssl-debuginfo >= 1.0.2j-16.1
  • openssl-debugsource >= 1.0.2j-16.1
  • openssl-doc >= 1.0.2j-16.1
  • python-virtualbox >= 5.1.36-50.1
  • python-virtualbox-debuginfo >= 5.1.36-50.1
  • virtualbox >= 5.1.36-50.1
  • virtualbox-debuginfo >= 5.1.36-50.1
  • virtualbox-debugsource >= 5.1.36-50.1
  • virtualbox-devel >= 5.1.36-50.1
  • virtualbox-guest-desktop-icons >= 5.1.36-50.1
  • virtualbox-guest-kmp-default >= 5.1.36_k4.4.126_48-50.1
  • virtualbox-guest-kmp-default-debuginfo >= 5.1.36_k4.4.126_48-50.1
  • virtualbox-guest-source >= 5.1.36-50.1
  • virtualbox-guest-tools >= 5.1.36-50.1
  • virtualbox-guest-tools-debuginfo >= 5.1.36-50.1
  • virtualbox-guest-x11 >= 5.1.36-50.1
  • virtualbox-guest-x11-debuginfo >= 5.1.36-50.1
  • virtualbox-host-kmp-default >= 5.1.36_k4.4.126_48-50.1
  • virtualbox-host-kmp-default-debuginfo >= 5.1.36_k4.4.126_48-50.1
  • virtualbox-host-source >= 5.1.36-50.1
  • virtualbox-qt >= 5.1.36-50.1
  • virtualbox-qt-debuginfo >= 5.1.36-50.1
  • virtualbox-vnc >= 5.1.36-50.1
  • virtualbox-websrv >= 5.1.36-50.1
  • virtualbox-websrv-debuginfo >= 5.1.36-50.1
Patchnames:
openSUSE-2017-1381
openSUSE-2018-389
openSUSE-2018-90


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
CaaS Platform 1.0 openssl Released
CaaS Platform 2.0 openssl Released
OpenStack Cloud Magnum Orchestration 7.0 openssl Released
SUSE Linux Enterprise Desktop 12 SP2 compat-openssl098 Unsupported
SUSE Linux Enterprise Desktop 12 SP2 openssl Released
SUSE Linux Enterprise Desktop 12 SP3 compat-openssl098 Not affected
SUSE Linux Enterprise Desktop 12 SP3 openssl Released
SUSE Linux Enterprise Module for Legacy Software 12 compat-openssl098 Not affected
SUSE Linux Enterprise SDK 11 SP4 openssl Not affected
SUSE Linux Enterprise SDK 12 SP2 openssl Released
SUSE Linux Enterprise SDK 12 SP3 openssl Released
SUSE Linux Enterprise Security Module 11.3 GA openssl1 Affected
SUSE Linux Enterprise Server 11 SP3 LTSS openssl Not affected
SUSE Linux Enterprise Server 11 SP4 openssl Not affected
SUSE Linux Enterprise Server 12 SP2 openssl Released
SUSE Linux Enterprise Server 12 SP3 openssl Released
SUSE Linux Enterprise Server for SAP 11 SP3 compat-openssl097g Not affected
SUSE Linux Enterprise Server for SAP 11 SP4 compat-openssl097g Not affected
SUSE Linux Enterprise Server for SAP 12 SP1 compat-openssl098 Not affected
SUSE Linux Enterprise Server for SAP 12 SP2 compat-openssl098 Not affected
SUSE Linux Enterprise Server for SAP 12 SP3 compat-openssl098 Not affected
SUSE Studio Onsite 1.3 openssl Not affected