rpm package
suse/openssl-3&distro=SUSE Linux Enterprise Module for Basesystem 15 SP4
pkg:rpm/suse/openssl-3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4
Vulnerabilities (29)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-5678 | Med | 5.3 | < 3.0.8-150400.4.42.1 | 3.0.8-150400.4.42.1 | Nov 6, 2023 | Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applicatio | |
| CVE-2023-5363 | Hig | 7.5 | < 3.0.8-150400.4.37.1 | 3.0.8-150400.4.37.1 | Oct 25, 2023 | Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, | |
| CVE-2023-3817 | — | < 3.0.8-150400.4.34.1 | 3.0.8-150400.4.34.1 | Jul 31, 2023 | Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters tha | ||
| CVE-2023-3446 | — | < 3.0.8-150400.4.31.2 | 3.0.8-150400.4.31.2 | Jul 19, 2023 | Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters tha | ||
| CVE-2023-2975 | — | < 3.0.8-150400.4.31.2 | 3.0.8-150400.4.31.2 | Jul 14, 2023 | Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associate | ||
| CVE-2023-2650 | — | < 3.0.8-150400.4.26.1 | 3.0.8-150400.4.26.1 | May 30, 2023 | Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limi | ||
| CVE-2023-1255 | — | < 3.0.8-150400.4.26.1 | 3.0.8-150400.4.26.1 | Apr 20, 2023 | Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circ | ||
| CVE-2023-0466 | — | < 3.0.1-150400.4.23.1 | 3.0.1-150400.4.23.1 | Mar 28, 2023 | The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to p | ||
| CVE-2023-0465 | — | < 3.0.1-150400.4.23.1 | 3.0.1-150400.4.23.1 | Mar 28, 2023 | Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipp | ||
| CVE-2023-0464 | — | < 3.0.1-150400.4.20.1 | 3.0.1-150400.4.20.1 | Mar 22, 2023 | A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers | ||
| CVE-2022-4203 | — | < 3.0.1-150400.4.17.1 | 3.0.1-150400.4.17.1 | Feb 24, 2023 | A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to con | ||
| CVE-2022-4304 | — | < 3.0.1-150400.4.17.1 | 3.0.1-150400.4.17.1 | Feb 8, 2023 | A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of | ||
| CVE-2022-4450 | — | < 3.0.1-150400.4.17.1 | 3.0.1-150400.4.17.1 | Feb 8, 2023 | The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing t | ||
| CVE-2023-0215 | — | < 3.0.1-150400.4.17.1 | 3.0.1-150400.4.17.1 | Feb 8, 2023 | The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receiv | ||
| CVE-2023-0216 | — | < 3.0.1-150400.4.17.1 | 3.0.1-150400.4.17.1 | Feb 8, 2023 | An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. | ||
| CVE-2023-0217 | — | < 3.0.1-150400.4.17.1 | 3.0.1-150400.4.17.1 | Feb 8, 2023 | An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted so | ||
| CVE-2023-0286 | — | < 3.0.1-150400.4.17.1 | 3.0.1-150400.4.17.1 | Feb 8, 2023 | There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This | ||
| CVE-2023-0401 | — | < 3.0.1-150400.4.17.1 | 3.0.1-150400.4.17.1 | Feb 8, 2023 | A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initializat | ||
| CVE-2022-3996 | — | < 3.0.1-150400.4.14.1 | 3.0.1-150400.4.14.1 | Dec 13, 2022 | If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy proce | ||
| CVE-2022-40735 | — | < 3.0.8-150400.4.26.1 | 3.0.8-150400.4.26.1 | Nov 14, 2022 | The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that "(appropriately) short exponents" can be used when there are adequate subgroup constra |
- affected < 3.0.8-150400.4.42.1fixed 3.0.8-150400.4.42.1
Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applicatio
- affected < 3.0.8-150400.4.37.1fixed 3.0.8-150400.4.37.1
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness,
- CVE-2023-3817Jul 31, 2023affected < 3.0.8-150400.4.34.1fixed 3.0.8-150400.4.34.1
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters tha
- CVE-2023-3446Jul 19, 2023affected < 3.0.8-150400.4.31.2fixed 3.0.8-150400.4.31.2
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters tha
- CVE-2023-2975Jul 14, 2023affected < 3.0.8-150400.4.31.2fixed 3.0.8-150400.4.31.2
Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associate
- CVE-2023-2650May 30, 2023affected < 3.0.8-150400.4.26.1fixed 3.0.8-150400.4.26.1
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limi
- CVE-2023-1255Apr 20, 2023affected < 3.0.8-150400.4.26.1fixed 3.0.8-150400.4.26.1
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circ
- CVE-2023-0466Mar 28, 2023affected < 3.0.1-150400.4.23.1fixed 3.0.1-150400.4.23.1
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to p
- CVE-2023-0465Mar 28, 2023affected < 3.0.1-150400.4.23.1fixed 3.0.1-150400.4.23.1
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipp
- CVE-2023-0464Mar 22, 2023affected < 3.0.1-150400.4.20.1fixed 3.0.1-150400.4.20.1
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers
- CVE-2022-4203Feb 24, 2023affected < 3.0.1-150400.4.17.1fixed 3.0.1-150400.4.17.1
A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to con
- CVE-2022-4304Feb 8, 2023affected < 3.0.1-150400.4.17.1fixed 3.0.1-150400.4.17.1
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of
- CVE-2022-4450Feb 8, 2023affected < 3.0.1-150400.4.17.1fixed 3.0.1-150400.4.17.1
The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing t
- CVE-2023-0215Feb 8, 2023affected < 3.0.1-150400.4.17.1fixed 3.0.1-150400.4.17.1
The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receiv
- CVE-2023-0216Feb 8, 2023affected < 3.0.1-150400.4.17.1fixed 3.0.1-150400.4.17.1
An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack.
- CVE-2023-0217Feb 8, 2023affected < 3.0.1-150400.4.17.1fixed 3.0.1-150400.4.17.1
An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted so
- CVE-2023-0286Feb 8, 2023affected < 3.0.1-150400.4.17.1fixed 3.0.1-150400.4.17.1
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This
- CVE-2023-0401Feb 8, 2023affected < 3.0.1-150400.4.17.1fixed 3.0.1-150400.4.17.1
A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initializat
- CVE-2022-3996Dec 13, 2022affected < 3.0.1-150400.4.14.1fixed 3.0.1-150400.4.14.1
If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy proce
- CVE-2022-40735Nov 14, 2022affected < 3.0.8-150400.4.26.1fixed 3.0.8-150400.4.26.1
The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that "(appropriately) short exponents" can be used when there are adequate subgroup constra
Page 1 of 2