VYPR

crates.io package

openssl-src

pkg:cargo/openssl-src

Vulnerabilities (26)

  • CVE-2022-4203Feb 24, 2023
    affected >= 300.0.0, < 300.0.12fixed 300.0.12

    A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to con

  • CVE-2022-4304Feb 8, 2023
    affected < 111.25.0fixed 111.25.0

    A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of

  • CVE-2022-4450Feb 8, 2023
    affected < 111.25.0fixed 111.25.0

    The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing t

  • CVE-2023-0215Feb 8, 2023
    affected < 111.25.0fixed 111.25.0

    The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receiv

  • CVE-2023-0216Feb 8, 2023
    affected >= 300.0.0, < 300.0.12fixed 300.0.12

    An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack.

  • CVE-2023-0217Feb 8, 2023
    affected >= 300.0.0, < 300.0.12fixed 300.0.12

    An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted so

  • CVE-2023-0286Feb 8, 2023
    affected < 111.25.0fixed 111.25.0

    There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This

  • CVE-2023-0401Feb 8, 2023
    affected >= 300.0.0, < 300.0.12fixed 300.0.12

    A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initializat

  • CVE-2022-3996Dec 13, 2022
    affected >= 300.0.0, < 300.0.12fixed 300.0.12

    If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy proce

  • CVE-2022-3786HigNov 1, 2022
    affected >= 300.0.0, < 300.0.11fixed 300.0.11

    A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue ce

  • CVE-2022-3602HigNov 1, 2022
    affected >= 300.0.0, < 300.0.11fixed 300.0.11

    A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue

  • CVE-2022-3358Oct 11, 2022
    affected >= 300.0.0, < 300.0.10fixed 300.0.10

    OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers

  • CVE-2022-2097Jul 5, 2022
    affected < 111.22.0fixed 111.22.0

    AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in

  • CVE-2022-2274Jul 1, 2022
    affected >= 300.0.8, < 300.0.9fixed 300.0.9

    The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computat

  • CVE-2022-1473May 3, 2022
    affected >= 300.0.0, < 300.0.6fixed 300.0.6

    The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its

  • CVE-2022-1434May 3, 2022
    affected >= 300.0.0, < 300.0.6fixed 300.0.6

    The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being sent from one endpoint to an Op

  • CVE-2022-1343May 3, 2022
    affected >= 300.0.0, < 300.0.6fixed 300.0.6

    The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fail

  • CVE-2022-0778HigMar 15, 2022
    affected >= 300.0.0, < 300.0.5fixed 300.0.5

    The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curv

  • CVE-2021-4044Dec 14, 2021
    affected >= 300.0.0, < 300.0.4fixed 300.0.4

    Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL

  • CVE-2021-3712HigAug 24, 2021
    affected < 111.16.0fixed 111.16.0

    ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated

Page 1 of 2