Количество 34
Количество 34
ELSA-2023-6330
ELSA-2023-6330: edk2 security, bug fix, and enhancement update (MODERATE)

CVE-2019-14560
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

CVE-2019-14560
[REJECTED CVE] A secure boot bypass vulnerability was found in EDK2 due to the lack of proper return value checks in the GetEfiGlobalVariable2() function. The API may fail if functions like AllocatePool() or gRT->GetVariable() fail. Without verifying the return value, an attacker could cause the API to fail, potentially bypassing secure boot. This issue occurs in functions like DxeImageVerificationHandler, where the return value is not checked.

CVE-2019-14560
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

CVE-2023-2650
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. T...

CVE-2023-2650
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. T...

CVE-2023-2650
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. T

CVE-2023-2650
CVE-2023-2650
Issue summary: Processing some specially crafted ASN.1 object identifi ...
ELSA-2023-6919
ELSA-2023-6919: edk2 security and bug fix update (MODERATE)

SUSE-SU-2023:2471-1
Security update for openssl1

SUSE-SU-2023:2469-1
Security update for openssl

SUSE-SU-2023:2343-1
Security update for openssl-1_1

SUSE-SU-2023:2342-1
Security update for openssl-1_1

SUSE-SU-2023:2332-1
Security update for openssl

SUSE-SU-2023:2331-1
Security update for openssl-1_0_0

SUSE-SU-2023:2330-1
Security update for openssl-1_0_0

SUSE-SU-2023:2329-1
Security update for compat-openssl098

SUSE-SU-2023:2328-1
Security update for openssl-1_1

SUSE-SU-2023:2327-1
Security update for openssl-1_1
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2023-6330 ELSA-2023-6330: edk2 security, bug fix, and enhancement update (MODERATE) | больше 1 года назад | |||
![]() | CVE-2019-14560 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none. | больше 2 лет назад | ||
![]() | CVE-2019-14560 [REJECTED CVE] A secure boot bypass vulnerability was found in EDK2 due to the lack of proper return value checks in the GetEfiGlobalVariable2() function. The API may fail if functions like AllocatePool() or gRT->GetVariable() fail. Without verifying the return value, an attacker could cause the API to fail, potentially bypassing secure boot. This issue occurs in functions like DxeImageVerificationHandler, where the return value is not checked. | CVSS3: 6.1 | около 5 лет назад | |
![]() | CVE-2019-14560 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none. | больше 2 лет назад | ||
![]() | CVE-2023-2650 Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. T... | CVSS3: 6.5 | 88% Высокий | около 2 лет назад |
![]() | CVE-2023-2650 Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. T... | CVSS3: 6.5 | 88% Высокий | около 2 лет назад |
![]() | CVE-2023-2650 Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. T | CVSS3: 6.5 | 88% Высокий | около 2 лет назад |
![]() | CVSS3: 6.5 | 88% Высокий | около 2 лет назад | |
CVE-2023-2650 Issue summary: Processing some specially crafted ASN.1 object identifi ... | CVSS3: 6.5 | 88% Высокий | около 2 лет назад | |
ELSA-2023-6919 ELSA-2023-6919: edk2 security and bug fix update (MODERATE) | больше 1 года назад | |||
![]() | SUSE-SU-2023:2471-1 Security update for openssl1 | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2469-1 Security update for openssl | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2343-1 Security update for openssl-1_1 | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2342-1 Security update for openssl-1_1 | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2332-1 Security update for openssl | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2331-1 Security update for openssl-1_0_0 | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2330-1 Security update for openssl-1_0_0 | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2329-1 Security update for compat-openssl098 | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2328-1 Security update for openssl-1_1 | 88% Высокий | около 2 лет назад | |
![]() | SUSE-SU-2023:2327-1 Security update for openssl-1_1 | 88% Высокий | около 2 лет назад |
Уязвимостей на страницу