VYPR

rpm package

opensuse/openssl-1_0_0&distro=openSUSE Leap 15.0

pkg:rpm/opensuse/openssl-1_0_0&distro=openSUSE%20Leap%2015.0

Vulnerabilities (3)

  • CVE-2019-1563Sep 10, 2019
    affected < 1.0.2p-lp150.2.19.1fixed 1.0.2p-lp150.2.19.1

    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message th

  • CVE-2019-1547Sep 10, 2019
    affected < 1.0.2p-lp150.2.19.1fixed 1.0.2p-lp150.2.19.1

    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a g

  • CVE-2019-1559Feb 27, 2019
    affected < 1.0.2p-lp150.2.13.1fixed 1.0.2p-lp150.2.13.1

    If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 by