Количество 23
Количество 23
BDU:2026-01220
Уязвимость функции PKCS7_digest_from_attributes() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2026-22796
Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be usi...
CVE-2026-22796
Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be usi
CVE-2026-22796
Issue summary: A type confusion vulnerability exists in the signature ...
GHSA-r9hf-rxjm-gv2f
Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be ...
SUSE-SU-2026:0333-1
Security update for openssl-1_0_0
SUSE-SU-2026:0332-1
Security update for openssl-1_0_0
SUSE-SU-2026:0360-1
Security update for openssl-1_1
SUSE-SU-2026:0359-1
Security update for openssl-1_1
SUSE-SU-2026:0358-1
Security update for openssl-1_1
SUSE-SU-2026:0346-1
Security update for openssl-1_1
SUSE-SU-2026:0331-1
Security update for openssl-1_1
SUSE-SU-2026:0312-1
Security update for openssl-3
SUSE-SU-2026:0311-1
Security update for openssl-3
SUSE-SU-2026:0310-1
Security update for openssl-3
SUSE-SU-2026:0309-1
Security update for openssl-3
openSUSE-SU-2026:20152-1
Security update for openssl-3
RLSA-2026:1472
Important: openssl security update
ELSA-2026-50081
ELSA-2026-50081: openssl security update (IMPORTANT)
ELSA-2026-50080
ELSA-2026-50080: openssl security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2026-01220 Уязвимость функции PKCS7_digest_from_attributes() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | около 1 месяца назад | |
CVE-2026-22796 Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be usi... | CVSS3: 5.3 | 0% Низкий | 14 дней назад | |
CVE-2026-22796 Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be usi | CVSS3: 5.3 | 0% Низкий | 14 дней назад | |
CVE-2026-22796 Issue summary: A type confusion vulnerability exists in the signature ... | CVSS3: 5.3 | 0% Низкий | 14 дней назад | |
GHSA-r9hf-rxjm-gv2f Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be ... | CVSS3: 5.3 | 0% Низкий | 14 дней назад | |
SUSE-SU-2026:0333-1 Security update for openssl-1_0_0 | 12 дней назад | |||
SUSE-SU-2026:0332-1 Security update for openssl-1_0_0 | 12 дней назад | |||
SUSE-SU-2026:0360-1 Security update for openssl-1_1 | 8 дней назад | |||
SUSE-SU-2026:0359-1 Security update for openssl-1_1 | 8 дней назад | |||
SUSE-SU-2026:0358-1 Security update for openssl-1_1 | 8 дней назад | |||
SUSE-SU-2026:0346-1 Security update for openssl-1_1 | 11 дней назад | |||
SUSE-SU-2026:0331-1 Security update for openssl-1_1 | 13 дней назад | |||
SUSE-SU-2026:0312-1 Security update for openssl-3 | 13 дней назад | |||
SUSE-SU-2026:0311-1 Security update for openssl-3 | 13 дней назад | |||
SUSE-SU-2026:0310-1 Security update for openssl-3 | 13 дней назад | |||
SUSE-SU-2026:0309-1 Security update for openssl-3 | 13 дней назад | |||
openSUSE-SU-2026:20152-1 Security update for openssl-3 | 8 дней назад | |||
RLSA-2026:1472 Important: openssl security update | 11 дней назад | |||
ELSA-2026-50081 ELSA-2026-50081: openssl security update (IMPORTANT) | 12 дней назад | |||
ELSA-2026-50080 ELSA-2026-50080: openssl security update (IMPORTANT) | 12 дней назад |
Уязвимостей на страницу