VYPR

rpm package

suse/openssl&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP2

pkg:rpm/suse/openssl&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Vulnerabilities (19)

  • CVE-2021-23840HigFeb 16, 2021
    affected < 1.0.2j-60.66.1fixed 1.0.2j-60.66.1

    Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be

  • CVE-2021-23841Feb 16, 2021
    affected < 1.0.2j-60.66.1fixed 1.0.2j-60.66.1

    The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (whi

  • CVE-2020-1971Dec 8, 2020
    affected < 1.0.2j-60.63.1fixed 1.0.2j-60.63.1

    The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This functi

  • CVE-2019-1551Dec 6, 2019
    affected < 1.0.2j-60.60.1fixed 1.0.2j-60.60.1

    There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult

  • CVE-2019-1563Sep 10, 2019
    affected < 1.0.2j-60.55.1fixed 1.0.2j-60.55.1

    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message th

  • CVE-2019-1547Sep 10, 2019
    affected < 1.0.2j-60.55.1fixed 1.0.2j-60.55.1

    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a g

  • CVE-2019-1559Feb 27, 2019
    affected < 1.0.2j-60.49.1fixed 1.0.2j-60.49.1

    If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 by

  • CVE-2018-5407Nov 15, 2018
    affected < 1.0.2j-60.46.1fixed 1.0.2j-60.46.1

    Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

  • CVE-2018-0734Oct 30, 2018
    affected < 1.0.2j-60.46.1fixed 1.0.2j-60.46.1

    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fi

  • CVE-2018-0732Jun 12, 2018
    affected < 1.0.2j-60.30.1fixed 1.0.2j-60.30.1

    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client

  • CVE-2018-0737Apr 16, 2018
    affected < 1.0.2j-60.39.1fixed 1.0.2j-60.39.1

    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affec

  • CVE-2018-0739Mar 27, 2018
    affected < 1.0.2j-60.24.1fixed 1.0.2j-60.24.1

    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from u

  • CVE-2017-3738MedDec 7, 2017
    affected < 1.0.2j-60.20.2fixed 1.0.2j-60.20.2

    There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believ

  • CVE-2017-3737MedDec 7, 2017
    affected < 1.0.2j-60.20.2fixed 1.0.2j-60.20.2

    OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as d

  • CVE-2017-3736MedNov 2, 2017
    affected < 1.0.2j-60.16.1fixed 1.0.2j-60.16.1

    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are n

  • CVE-2017-3735MedAug 28, 2017
    affected < 1.0.2j-60.16.1fixed 1.0.2j-60.16.1

    While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g

  • CVE-2016-7055MedMay 4, 2017
    affected < 1.0.2j-59.1fixed 1.0.2j-59.1

    There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impos

  • CVE-2017-3732MedMay 4, 2017
    affected < 1.0.2j-59.1fixed 1.0.2j-59.1

    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and

  • CVE-2017-3731HigMay 4, 2017
    affected < 1.0.2j-59.1fixed 1.0.2j-59.1

    If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA