VYPR

rpm package

opensuse/openssl-3&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/openssl-3&distro=openSUSE%20Tumbleweed

Vulnerabilities (68)

  • CVE-2026-31790HigApr 7, 2026
    affected < 3.5.3-4.1fixed 3.5.3-4.1

    Issue summary: Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer. Impact summary: The uninitialized buffer might contain sensitive data from the previous execution of the appli

  • CVE-2026-31789CriApr 7, 2026
    affected < 3.5.3-4.1fixed 3.5.3-4.1

    Issue summary: Converting an excessively large OCTET STRING value to a hexadecimal string leads to a heap buffer overflow on 32 bit platforms. Impact summary: A heap buffer overflow may lead to a crash or possibly an attacker controlled code execution or other undefined behavior

  • CVE-2026-28390HigApr 7, 2026
    affected < 3.5.3-4.1fixed 3.5.3-4.1

    Issue summary: During processing of a crafted CMS EnvelopedData message with KeyTransportRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur

  • CVE-2026-28389HigApr 7, 2026
    affected < 3.5.3-4.1fixed 3.5.3-4.1

    Issue summary: During processing of a crafted CMS EnvelopedData message with KeyAgreeRecipientInfo a NULL pointer dereference can happen. Impact summary: Applications that process attacker-controlled CMS data may crash before authentication or cryptographic operations occur resu

  • CVE-2026-28388HigApr 7, 2026
    affected < 3.5.3-4.1fixed 3.5.3-4.1

    Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing. Impact summary: A NULL pointer dereference can trigger a crash which leads to a Denial of Service f

  • CVE-2026-28387HigApr 7, 2026
    affected < 3.5.3-4.1fixed 3.5.3-4.1

    Issue summary: An uncommon configuration of clients performing DANE TLSA-based server authentication, when paired with uncommon server DANE TLSA records, may result in a use-after-free and/or double-free on the client side. Impact summary: A use after free can have a range of po

  • CVE-2026-2673MedMar 13, 2026
    affected < 3.5.3-4.1fixed 3.5.3-4.1

    Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be used even when a more pref

  • CVE-2026-22795MedJan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denia

  • CVE-2025-69421HigJan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. T

  • CVE-2025-69420HigJan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Imp

  • CVE-2025-69419HigJan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cau

  • CVE-2025-69418MedJan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: When using the low-level OCB API directly with AES-NI orother hardware-accelerated code paths, inputs whose length is not a multipleof 16 bytes can leave the final partial block unencrypted and unauthenticated.Impact summary: The trailing 1-15 bytes

  • CVE-2025-68160MedJan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in

  • CVE-2025-15467HigJan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When

  • CVE-2025-66199Jan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approx

  • CVE-2025-15469Jan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519,

  • CVE-2025-15468Jan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process ca

  • CVE-2025-11187Jan 27, 2026
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash

  • CVE-2025-9232MedSep 30, 2025
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address. Impact summary: An out-of-bounds read can

  • CVE-2025-9231MedSep 30, 2025
    affected < 3.5.3-2.1fixed 3.5.3-2.1

    Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recov

Page 1 of 4