rpm package
suse/openssl&distro=SUSE Linux Enterprise Server 11 SP4-LTSS
pkg:rpm/suse/openssl&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS
Vulnerabilities (8)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-0778 | Hig | 7.5 | < 0.9.8j-0.106.46.1 | 0.9.8j-0.106.46.1 | Mar 15, 2022 | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curv | |
| CVE-2021-3712 | Hig | 7.4 | < 0.9.8j-0.106.40.1 | 0.9.8j-0.106.40.1 | Aug 24, 2021 | ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated | |
| CVE-2021-23840 | Hig | 7.5 | < 0.9.8j-0.106.37.1 | 0.9.8j-0.106.37.1 | Feb 16, 2021 | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be | |
| CVE-2021-23841 | — | < 0.9.8j-0.106.37.1 | 0.9.8j-0.106.37.1 | Feb 16, 2021 | The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (whi | ||
| CVE-2020-1968 | Low | 3.7 | < 0.9.8j-0.106.34.1 | 0.9.8j-0.106.34.1 | Sep 9, 2020 | The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop o | |
| CVE-2019-1563 | — | < 0.9.8j-0.106.25.1 | 0.9.8j-0.106.25.1 | Sep 10, 2019 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message th | ||
| CVE-2019-1547 | — | < 0.9.8j-0.106.25.1 | 0.9.8j-0.106.25.1 | Sep 10, 2019 | Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a g | ||
| CVE-2019-1559 | — | < 0.9.8j-0.106.21.1 | 0.9.8j-0.106.21.1 | Feb 27, 2019 | If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 by |
- affected < 0.9.8j-0.106.46.1fixed 0.9.8j-0.106.46.1
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curv
- affected < 0.9.8j-0.106.40.1fixed 0.9.8j-0.106.40.1
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated
- affected < 0.9.8j-0.106.37.1fixed 0.9.8j-0.106.37.1
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be
- CVE-2021-23841Feb 16, 2021affected < 0.9.8j-0.106.37.1fixed 0.9.8j-0.106.37.1
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (whi
- affected < 0.9.8j-0.106.34.1fixed 0.9.8j-0.106.34.1
The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop o
- CVE-2019-1563Sep 10, 2019affected < 0.9.8j-0.106.25.1fixed 0.9.8j-0.106.25.1
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message th
- CVE-2019-1547Sep 10, 2019affected < 0.9.8j-0.106.25.1fixed 0.9.8j-0.106.25.1
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a g
- CVE-2019-1559Feb 27, 2019affected < 0.9.8j-0.106.21.1fixed 0.9.8j-0.106.21.1
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 by