VYPR

rpm package

suse/openssl&distro=SUSE OpenStack Cloud Crowbar 8

pkg:rpm/suse/openssl&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208

Vulnerabilities (10)

  • CVE-2022-2068Jun 21, 2022
    affected < 1.0.2j-60.83.1fixed 1.0.2j-60.83.1

    In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not dis

  • CVE-2022-1292May 3, 2022
    affected < 1.0.2j-60.80.1fixed 1.0.2j-60.80.1

    The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the

  • CVE-2022-0778HigMar 15, 2022
    affected < 1.0.2j-60.75.1fixed 1.0.2j-60.75.1

    The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curv

  • CVE-2021-3712HigAug 24, 2021
    affected < 1.0.2j-60.69.3fixed 1.0.2j-60.69.3

    ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated

  • CVE-2021-23840HigFeb 16, 2021
    affected < 1.0.2j-60.66.1fixed 1.0.2j-60.66.1

    Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be

  • CVE-2021-23841Feb 16, 2021
    affected < 1.0.2j-60.66.1fixed 1.0.2j-60.66.1

    The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (whi

  • CVE-2020-1971Dec 8, 2020
    affected < 1.0.2j-60.63.1fixed 1.0.2j-60.63.1

    The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This functi

  • CVE-2019-1551Dec 6, 2019
    affected < 1.0.2j-60.60.1fixed 1.0.2j-60.60.1

    There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult

  • CVE-2019-1563Sep 10, 2019
    affected < 1.0.2j-60.55.1fixed 1.0.2j-60.55.1

    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message th

  • CVE-2019-1547Sep 10, 2019
    affected < 1.0.2j-60.55.1fixed 1.0.2j-60.55.1

    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a g