VYPR

rpm package

suse/openssl-1_0_0&distro=SUSE Linux Enterprise Server 12 SP4-ESPOS

pkg:rpm/suse/openssl-1_0_0&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-ESPOS

Vulnerabilities (5)

  • CVE-2023-2650May 30, 2023
    affected < 1.0.2p-3.75.1fixed 1.0.2p-3.75.1

    Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limi

  • CVE-2023-0466Mar 28, 2023
    affected < 1.0.2p-3.72.1fixed 1.0.2p-3.72.1

    The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to p

  • CVE-2023-0465Mar 28, 2023
    affected < 1.0.2p-3.72.1fixed 1.0.2p-3.72.1

    Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipp

  • CVE-2023-0464Mar 22, 2023
    affected < 1.0.2p-3.69.1fixed 1.0.2p-3.69.1

    A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers

  • CVE-2022-4304Feb 8, 2023
    affected < 1.0.2p-3.78.1fixed 1.0.2p-3.78.1

    A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of