Количество 28
Количество 28
BDU:2024-06988
Уязвимость функции SSL_select_next_proto инструментария для протоколов TLS и SSL OpenSSL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
ROS-20250203-10
Уязвимость openssl
ROS-20241001-05
Множественные уязвимости openssl3
CVE-2024-5535
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiatio...
CVE-2024-5535
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiatio...
CVE-2024-5535
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation
CVE-2024-5535
CVE-2024-5535
Issue summary: Calling the OpenSSL API function SSL_select_next_proto ...
SUSE-SU-2024:3119-1
Security update for openssl-1_0_0
SUSE-SU-2024:3019-1
Security update for openssl-3
SUSE-SU-2024:2991-1
Security update for openssl1
SUSE-SU-2024:2989-1
Security update for openssl-1_0_0
SUSE-SU-2024:2933-1
Security update for openssl-1_1
SUSE-SU-2024:2931-1
Security update for openssl-3
SUSE-SU-2024:2927-1
Security update for openssl-1_1
SUSE-SU-2024:2909-1
Security update for openssl-1_1
SUSE-SU-2024:2891-1
Security update for openssl-1_1
SUSE-SU-2024:2761-1
Security update for openssl-3-livepatches
SUSE-SU-2024:2635-1
Security update for openssl-3
RLSA-2024:7848
Low: openssl security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-06988 Уязвимость функции SSL_select_next_proto инструментария для протоколов TLS и SSL OpenSSL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании | CVSS3: 9.1 | 3% Низкий | больше 1 года назад | |
ROS-20250203-10 Уязвимость openssl | CVSS3: 9.1 | 3% Низкий | около 1 года назад | |
ROS-20241001-05 Множественные уязвимости openssl3 | CVSS3: 9.1 | около 1 года назад | ||
CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiatio... | CVSS3: 9.1 | 3% Низкий | больше 1 года назад | |
CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiatio... | CVSS3: 5.9 | 3% Низкий | больше 1 года назад | |
CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation | CVSS3: 9.1 | 3% Низкий | больше 1 года назад | |
CVSS3: 9.1 | 3% Низкий | больше 1 года назад | ||
CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto ... | CVSS3: 9.1 | 3% Низкий | больше 1 года назад | |
SUSE-SU-2024:3119-1 Security update for openssl-1_0_0 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:3019-1 Security update for openssl-3 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2991-1 Security update for openssl1 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2989-1 Security update for openssl-1_0_0 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2933-1 Security update for openssl-1_1 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2931-1 Security update for openssl-3 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2927-1 Security update for openssl-1_1 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2909-1 Security update for openssl-1_1 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2891-1 Security update for openssl-1_1 | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2761-1 Security update for openssl-3-livepatches | 3% Низкий | около 1 года назад | ||
SUSE-SU-2024:2635-1 Security update for openssl-3 | 3% Низкий | больше 1 года назад | ||
RLSA-2024:7848 Low: openssl security update | 3% Низкий | около 1 года назад |
Уязвимостей на страницу