Количество 1 198
Количество 1 198
SUSE-SU-2021:14791-1
Security update for openssl
RLSA-2021:5226
Moderate: openssl security update
GHSA-q9wj-f4qw-6vfj
Read buffer overruns processing ASN.1 strings
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL ter...
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL ter...
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL termin
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STR ...
openSUSE-SU-2020:2269-1
Security update for openssl-1_0_0
openSUSE-SU-2020:2245-1
Security update for openssl-1_1
openSUSE-SU-2020:2236-1
Security update for openssl-1_0_0
openSUSE-SU-2020:2223-1
Security update for openssl-1_1
SUSE-SU-2020:3763-1
Security update for openssl
SUSE-SU-2020:3762-1
Security update for openssl-1_0_0
SUSE-SU-2020:3740-1
Security update for openssl-1_1
SUSE-SU-2020:3732-1
Security update for openssl-1_0_0
SUSE-SU-2020:3722-1
Security update for openssl-1_1
SUSE-SU-2020:3721-1
Security update for openssl-1_1
SUSE-SU-2020:3720-1
Security update for openssl-1_1
SUSE-SU-2020:14560-1
Security update for openssl1
GHSA-whf2-mq76-2fhv
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
SUSE-SU-2021:14791-1 Security update for openssl  | 1% Низкий | около 4 лет назад | ||
RLSA-2021:5226 Moderate: openssl security update  | 1% Низкий | почти 4 года назад | ||
GHSA-q9wj-f4qw-6vfj Read buffer overruns processing ASN.1 strings  | CVSS3: 7.4  | 1% Низкий | больше 3 лет назад | |
CVE-2021-3712 ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL ter...  | CVSS3: 7.4  | 1% Низкий | около 4 лет назад | |
CVE-2021-3712 ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL ter...  | CVSS3: 7.4  | 1% Низкий | около 4 лет назад | |
CVE-2021-3712 ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL termin  | CVSS3: 7.4  | 1% Низкий | около 4 лет назад | |
CVE-2021-3712 ASN.1 strings are represented internally within OpenSSL as an ASN1_STR ...  | CVSS3: 7.4  | 1% Низкий | около 4 лет назад | |
openSUSE-SU-2020:2269-1 Security update for openssl-1_0_0  | 0% Низкий | почти 5 лет назад | ||
openSUSE-SU-2020:2245-1 Security update for openssl-1_1  | 0% Низкий | почти 5 лет назад | ||
openSUSE-SU-2020:2236-1 Security update for openssl-1_0_0  | 0% Низкий | почти 5 лет назад | ||
openSUSE-SU-2020:2223-1 Security update for openssl-1_1  | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:3763-1 Security update for openssl  | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:3762-1 Security update for openssl-1_0_0  | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:3740-1 Security update for openssl-1_1  | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:3732-1 Security update for openssl-1_0_0  | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:3722-1 Security update for openssl-1_1  | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:3721-1 Security update for openssl-1_1  | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:3720-1 Security update for openssl-1_1  | 0% Низкий | почти 5 лет назад | ||
SUSE-SU-2020:14560-1 Security update for openssl1  | 0% Низкий | почти 5 лет назад | ||
GHSA-whf2-mq76-2fhv The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...  | CVSS3: 5.9  | 0% Низкий | больше 3 лет назад | 
Уязвимостей на страницу