Описание
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiat...
Релиз | Статус | Примечание |
---|---|---|
devel | needs-triage | |
esm-apps/bionic | needs-triage | |
esm-apps/xenial | needs-triage | |
esm-infra/focal | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | needs-triage | |
mantic | ignored | end of life, was needs-triage |
noble | needs-triage | |
oracular | needs-triage | |
plucky | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | uses system openssl |
esm-apps/bionic | needs-triage | |
esm-apps/focal | not-affected | uses system openssl |
esm-apps/jammy | needs-triage | |
esm-apps/noble | not-affected | uses system openssl |
esm-apps/xenial | needs-triage | |
esm-infra-legacy/trusty | not-affected | uses system openssl |
focal | not-affected | uses system openssl |
jammy | needed | |
mantic | not-affected | uses system openssl |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.2.2-1ubuntu2 |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/bionic | needs-triage | |
esm-infra/focal | not-affected | 1.1.1f-1ubuntu2.23 |
esm-infra/xenial | needs-triage | |
fips-preview/jammy | needed | |
fips-updates/bionic | needs-triage | |
fips-updates/focal | released | 1.1.1f-1ubuntu2.fips.23 |
fips-updates/jammy | released | 3.0.2-0ubuntu1.17+Fips1 |
fips-updates/xenial | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/bionic | needs-triage | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
mantic | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
EPSS
9.1 Critical
CVSS3
Связанные уязвимости
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiatio...
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation
Issue summary: Calling the OpenSSL API function SSL_select_next_proto ...
EPSS
9.1 Critical
CVSS3