VYPR

rpm package

suse/compat-openssl098&distro=SUSE Linux Enterprise Module for Legacy 12

pkg:rpm/suse/compat-openssl098&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2012

Vulnerabilities (67)

  • CVE-2018-0732Jun 12, 2018
    affected < 0.9.8j-106.6.1fixed 0.9.8j-106.6.1

    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client

  • CVE-2018-0737Apr 16, 2018
    affected < 0.9.8j-106.6.1fixed 0.9.8j-106.6.1

    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affec

  • CVE-2018-0739Mar 27, 2018
    affected < 0.9.8j-106.6.1fixed 0.9.8j-106.6.1

    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from u

  • CVE-2016-8610HigNov 13, 2017
    affected < 0.9.8j-105.1fixed 0.9.8j-105.1

    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amoun

  • CVE-2016-6306MedSep 26, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.

  • CVE-2016-6304HigSep 26, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.

  • CVE-2016-6303CriSep 16, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.

  • CVE-2016-6302HigSep 16, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.

  • CVE-2016-2182CriSep 16, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors

  • CVE-2016-2181HigSep 16, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, re

  • CVE-2016-2179HigSep 16, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simulta

  • CVE-2016-2183HigSep 1, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-dura

  • CVE-2016-2178MedJun 20, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.

  • CVE-2016-2177CriJun 20, 2016
    affected < 0.9.8j-102.1fixed 0.9.8j-102.1

    OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior,

  • CVE-2016-2109HigMay 5, 2016
    affected < 0.9.8j-97.1fixed 0.9.8j-97.1

    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.

  • CVE-2016-2108CriMay 5, 2016
    affected < 0.9.8j-97.1fixed 0.9.8j-97.1

    The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.

  • CVE-2016-2106HigMay 5, 2016
    affected < 0.9.8j-97.1fixed 0.9.8j-97.1

    Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.

  • CVE-2016-2105HigMay 5, 2016
    affected < 0.9.8j-97.1fixed 0.9.8j-97.1

    Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

  • CVE-2016-0799CriMar 3, 2016
    affected < 0.9.8j-94.1fixed 0.9.8j-94.1

    The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a lo

  • CVE-2016-0797HigMar 3, 2016
    affected < 0.9.8j-94.1fixed 0.9.8j-94.1

    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (