VYPR

crates.io package

openssl-src

pkg:cargo/openssl-src

Vulnerabilities (26)

  • CVE-2021-3711Aug 24, 2021
    affected < 111.16.0fixed 111.16.0

    In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with

  • CVE-2021-3450Mar 25, 2021
    affected >= 111.11.0, < 111.15.0fixed 111.15.0

    The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve paramet

  • CVE-2021-3449Mar 25, 2021
    affected < 111.15.0fixed 111.15.0

    An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_ce

  • CVE-2021-23840HigFeb 16, 2021
    affected < 111.14.0fixed 111.14.0

    Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be

  • CVE-2021-23841Feb 16, 2021
    affected < 111.14.0fixed 111.14.0

    The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (whi

  • CVE-2020-1967Apr 21, 2020
    affected >= 111.6.0, < 111.9.0fixed 111.9.0

    Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognise

Page 2 of 2