VYPR

rpm package

suse/openssl-1_1&distro=SUSE Linux Enterprise Software Development Kit 12 SP5

pkg:rpm/suse/openssl-1_1&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5

Vulnerabilities (30)

  • CVE-2024-4741HigNov 13, 2024
    affected < 1.1.1d-2.107.1fixed 1.1.1d-2.107.1

    Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of

  • CVE-2024-5535CriJun 27, 2024
    affected < 1.1.1d-2.110.2fixed 1.1.1d-2.110.2

    Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected appl

  • CVE-2024-2511MedApr 8, 2024
    affected < 1.1.1d-2.110.2fixed 1.1.1d-2.110.2

    Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This prob

  • CVE-2024-0727MedJan 26, 2024
    affected < 1.1.1d-2.104.1fixed 1.1.1d-2.104.1

    Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can c

  • CVE-2023-5678MedNov 6, 2023
    affected < 1.1.1d-2.101.1fixed 1.1.1d-2.101.1

    Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applicatio

  • CVE-2023-3817Jul 31, 2023
    affected < 1.1.1d-2.98.1fixed 1.1.1d-2.98.1

    Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters tha

  • CVE-2023-3446Jul 19, 2023
    affected < 1.1.1d-2.92.1fixed 1.1.1d-2.92.1

    Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters tha

  • CVE-2023-2650May 30, 2023
    affected < 1.1.1d-2.84.1fixed 1.1.1d-2.84.1

    Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limi

  • CVE-2023-0466Mar 28, 2023
    affected < 1.1.1d-2.81.1fixed 1.1.1d-2.81.1

    The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to p

  • CVE-2023-0465Mar 28, 2023
    affected < 1.1.1d-2.81.1fixed 1.1.1d-2.81.1

    Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipp

  • CVE-2023-0464Mar 22, 2023
    affected < 1.1.1d-2.78.1fixed 1.1.1d-2.78.1

    A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers

  • CVE-2022-4304Feb 8, 2023
    affected < 1.1.1d-2.75.1fixed 1.1.1d-2.75.1

    A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of

  • CVE-2022-4450Feb 8, 2023
    affected < 1.1.1d-2.75.1fixed 1.1.1d-2.75.1

    The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing t

  • CVE-2023-0215Feb 8, 2023
    affected < 1.1.1d-2.75.1fixed 1.1.1d-2.75.1

    The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receiv

  • CVE-2023-0286Feb 8, 2023
    affected < 1.1.1d-2.75.1fixed 1.1.1d-2.75.1

    There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This

  • CVE-2022-2097Jul 5, 2022
    affected < 1.1.1d-2.69.1fixed 1.1.1d-2.69.1

    AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in

  • CVE-2022-2068Jun 21, 2022
    affected < 1.1.1d-2.66.1fixed 1.1.1d-2.66.1

    In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not dis

  • CVE-2022-1292May 3, 2022
    affected < 1.1.1d-2.66.1fixed 1.1.1d-2.66.1

    The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the

  • CVE-2022-0778HigMar 15, 2022
    affected < 1.1.1d-2.61.1fixed 1.1.1d-2.61.1

    The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curv

  • CVE-2021-3712HigAug 24, 2021
    affected < 1.1.1d-2.36.2fixed 1.1.1d-2.36.2

    ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated

Page 1 of 2