{"affected":[{"ecosystem_specific":{"binaries":[{"libopenssl-1_0_0-devel":"1.0.2p-3.40.2","libopenssl-1_0_0-devel-32bit":"1.0.2p-3.40.2","libopenssl10":"1.0.2p-3.40.2","libopenssl1_0_0":"1.0.2p-3.40.2","libopenssl1_0_0-32bit":"1.0.2p-3.40.2","libopenssl1_0_0-hmac":"1.0.2p-3.40.2","libopenssl1_0_0-hmac-32bit":"1.0.2p-3.40.2","libopenssl1_0_0-steam":"1.0.2p-3.40.2","libopenssl1_0_0-steam-32bit":"1.0.2p-3.40.2","openssl-1_0_0":"1.0.2p-3.40.2","openssl-1_0_0-cavs":"1.0.2p-3.40.2","openssl-1_0_0-doc":"1.0.2p-3.40.2"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"openssl-1_0_0","purl":"pkg:rpm/opensuse/openssl-1_0_0&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.2p-3.40.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for openssl-1_0_0 fixes the following issues:\n\n- CVE-2021-3712: a bug in the code for printing certificate details could lead\n  to a buffer overrun that a malicious actor could exploit to crash the\n  application, causing a denial-of-service attack. [bsc#1189521]\n","id":"openSUSE-SU-2021:2827-1","modified":"2021-08-24T14:16:52Z","published":"2021-08-24T14:16:52Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNTTGRCRZBMWGGU4UK4PHVAAZAFABI2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189521"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3712"}],"related":["CVE-2021-3712"],"summary":"Security update for openssl-1_0_0","upstream":["CVE-2021-3712"]}