Количество 29
Количество 29

CVE-2021-23840
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).

CVE-2021-23840
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).

CVE-2021-23840
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2021-23840
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may ...
GHSA-qgm6-9472-pwq7
Integer Overflow in openssl-src

BDU:2021-03742
Уязвимость функций EVP_CipherUpdate, EVP_EncryptUpdate и EVP_DecryptUpdate инструментария для протоколов TLS и SSL OpenSSL, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2021:0430-1
Security update for openssl-1_0_0

openSUSE-SU-2021:0427-1
Security update for openssl-1_1

SUSE-SU-2021:14670-1
Security update for openssl

SUSE-SU-2021:14667-1
Security update for openssl1

SUSE-SU-2021:0939-1
Security update for openssl

SUSE-SU-2021:0793-1
Security update for compat-openssl098

SUSE-SU-2021:0769-1
Security update for openssl-1_0_0

SUSE-SU-2021:0755-1
Security update for openssl-1_1

SUSE-SU-2021:0754-1
Security update for openssl-1_1

SUSE-SU-2021:0753-1
Security update for openssl-1_1

SUSE-SU-2021:0752-1
Security update for openssl-1_1

SUSE-SU-2021:0725-1
Security update for openssl-1_0_0
ELSA-2021-9561
ELSA-2021-9561: openssl security update (MODERATE)
ELSA-2021-9528
ELSA-2021-9528: openssl security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-23840 Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад |
![]() | CVE-2021-23840 Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад |
![]() | CVE-2021-23840 Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад |
CVE-2021-23840 Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may ... | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад | |
GHSA-qgm6-9472-pwq7 Integer Overflow in openssl-src | CVSS3: 7.5 | 1% Низкий | почти 4 года назад | |
![]() | BDU:2021-03742 Уязвимость функций EVP_CipherUpdate, EVP_EncryptUpdate и EVP_DecryptUpdate инструментария для протоколов TLS и SSL OpenSSL, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 4 лет назад |
![]() | openSUSE-SU-2021:0430-1 Security update for openssl-1_0_0 | больше 4 лет назад | ||
![]() | openSUSE-SU-2021:0427-1 Security update for openssl-1_1 | больше 4 лет назад | ||
![]() | SUSE-SU-2021:14670-1 Security update for openssl | больше 4 лет назад | ||
![]() | SUSE-SU-2021:14667-1 Security update for openssl1 | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0939-1 Security update for openssl | около 4 лет назад | ||
![]() | SUSE-SU-2021:0793-1 Security update for compat-openssl098 | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0769-1 Security update for openssl-1_0_0 | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0755-1 Security update for openssl-1_1 | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0754-1 Security update for openssl-1_1 | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0753-1 Security update for openssl-1_1 | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0752-1 Security update for openssl-1_1 | больше 4 лет назад | ||
![]() | SUSE-SU-2021:0725-1 Security update for openssl-1_0_0 | больше 4 лет назад | ||
ELSA-2021-9561 ELSA-2021-9561: openssl security update (MODERATE) | больше 3 лет назад | |||
ELSA-2021-9528 ELSA-2021-9528: openssl security update (IMPORTANT) | больше 3 лет назад |
Уязвимостей на страницу