rpm package
suse/openssl-1_1&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP4
pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4
Vulnerabilities (26)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-2650 | — | < 1.1.1d-2.84.1 | 1.1.1d-2.84.1 | May 30, 2023 | Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limi | ||
| CVE-2023-0466 | — | < 1.1.1d-2.81.1 | 1.1.1d-2.81.1 | Mar 28, 2023 | The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to p | ||
| CVE-2023-0465 | — | < 1.1.1d-2.81.1 | 1.1.1d-2.81.1 | Mar 28, 2023 | Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipp | ||
| CVE-2023-0464 | — | < 1.1.1d-2.78.1 | 1.1.1d-2.78.1 | Mar 22, 2023 | A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers | ||
| CVE-2022-4304 | — | < 1.1.1d-2.75.1 | 1.1.1d-2.75.1 | Feb 8, 2023 | A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of | ||
| CVE-2022-4450 | — | < 1.1.1d-2.75.1 | 1.1.1d-2.75.1 | Feb 8, 2023 | The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing t | ||
| CVE-2023-0215 | — | < 1.1.1d-2.75.1 | 1.1.1d-2.75.1 | Feb 8, 2023 | The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receiv | ||
| CVE-2023-0286 | — | < 1.1.1d-2.75.1 | 1.1.1d-2.75.1 | Feb 8, 2023 | There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This | ||
| CVE-2022-2097 | — | < 1.1.1d-2.69.1 | 1.1.1d-2.69.1 | Jul 5, 2022 | AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in | ||
| CVE-2022-2068 | — | < 1.1.1d-2.66.1 | 1.1.1d-2.66.1 | Jun 21, 2022 | In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not dis | ||
| CVE-2022-1292 | — | < 1.1.1d-2.66.1 | 1.1.1d-2.66.1 | May 3, 2022 | The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the | ||
| CVE-2022-0778 | Hig | 7.5 | < 1.1.1d-2.61.1 | 1.1.1d-2.61.1 | Mar 15, 2022 | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curv | |
| CVE-2021-3712 | Hig | 7.4 | < 1.1.1d-2.36.2 | 1.1.1d-2.36.2 | Aug 24, 2021 | ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated | |
| CVE-2021-3711 | — | < 1.1.1d-2.36.2 | 1.1.1d-2.36.2 | Aug 24, 2021 | In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with | ||
| CVE-2021-3449 | — | < 1.1.1d-2.33.1 | 1.1.1d-2.33.1 | Mar 25, 2021 | An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_ce | ||
| CVE-2021-23840 | Hig | 7.5 | < 1.1.1d-2.30.1 | 1.1.1d-2.30.1 | Feb 16, 2021 | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be | |
| CVE-2021-23841 | — | < 1.1.1d-2.30.1 | 1.1.1d-2.30.1 | Feb 16, 2021 | The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (whi | ||
| CVE-2020-1971 | — | < 1.1.1d-2.27.1 | 1.1.1d-2.27.1 | Dec 8, 2020 | The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This functi | ||
| CVE-2020-1967 | — | < 1.1.1d-2.23.1 | 1.1.1d-2.23.1 | Apr 21, 2020 | Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognise | ||
| CVE-2019-1551 | — | < 1.1.1d-2.20.1 | 1.1.1d-2.20.1 | Dec 6, 2019 | There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult |
- CVE-2023-2650May 30, 2023affected < 1.1.1d-2.84.1fixed 1.1.1d-2.84.1
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limi
- CVE-2023-0466Mar 28, 2023affected < 1.1.1d-2.81.1fixed 1.1.1d-2.81.1
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to p
- CVE-2023-0465Mar 28, 2023affected < 1.1.1d-2.81.1fixed 1.1.1d-2.81.1
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipp
- CVE-2023-0464Mar 22, 2023affected < 1.1.1d-2.78.1fixed 1.1.1d-2.78.1
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers
- CVE-2022-4304Feb 8, 2023affected < 1.1.1d-2.75.1fixed 1.1.1d-2.75.1
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of
- CVE-2022-4450Feb 8, 2023affected < 1.1.1d-2.75.1fixed 1.1.1d-2.75.1
The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing t
- CVE-2023-0215Feb 8, 2023affected < 1.1.1d-2.75.1fixed 1.1.1d-2.75.1
The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receiv
- CVE-2023-0286Feb 8, 2023affected < 1.1.1d-2.75.1fixed 1.1.1d-2.75.1
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This
- CVE-2022-2097Jul 5, 2022affected < 1.1.1d-2.69.1fixed 1.1.1d-2.69.1
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in
- CVE-2022-2068Jun 21, 2022affected < 1.1.1d-2.66.1fixed 1.1.1d-2.66.1
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not dis
- CVE-2022-1292May 3, 2022affected < 1.1.1d-2.66.1fixed 1.1.1d-2.66.1
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the
- affected < 1.1.1d-2.61.1fixed 1.1.1d-2.61.1
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curv
- affected < 1.1.1d-2.36.2fixed 1.1.1d-2.36.2
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated
- CVE-2021-3711Aug 24, 2021affected < 1.1.1d-2.36.2fixed 1.1.1d-2.36.2
In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with
- CVE-2021-3449Mar 25, 2021affected < 1.1.1d-2.33.1fixed 1.1.1d-2.33.1
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_ce
- affected < 1.1.1d-2.30.1fixed 1.1.1d-2.30.1
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be
- CVE-2021-23841Feb 16, 2021affected < 1.1.1d-2.30.1fixed 1.1.1d-2.30.1
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (whi
- CVE-2020-1971Dec 8, 2020affected < 1.1.1d-2.27.1fixed 1.1.1d-2.27.1
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This functi
- CVE-2020-1967Apr 21, 2020affected < 1.1.1d-2.23.1fixed 1.1.1d-2.23.1
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognise
- CVE-2019-1551Dec 6, 2019affected < 1.1.1d-2.20.1fixed 1.1.1d-2.20.1
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult
Page 1 of 2