Количество 47
Количество 47

openSUSE-SU-2018:3903-1
Security update for openssl

SUSE-SU-2018:4001-1
Security update for openssl-1_0_0

SUSE-SU-2018:3989-1
Security update for openssl-1_0_0

SUSE-SU-2018:3866-1
Security update for openssl
ELSA-2019-2304
ELSA-2019-2304: openssl security and bug fix update (MODERATE)

openSUSE-SU-2018:4104-1
Security update for compat-openssl098

SUSE-SU-2018:4274-1
Security update for openssl

SUSE-SU-2018:4068-1
Security update for compat-openssl098

SUSE-SU-2018:3964-1
Security update for openssl1

SUSE-SU-2018:3864-2
Security update for openssl

SUSE-SU-2018:3864-1
Security update for openssl

openSUSE-SU-2019:1814-1
Security update for virtualbox
GHSA-4fhm-44hf-3465
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

BDU:2019-01881
Уязвимость реализации алгоритма шифрования ECDSA библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

openSUSE-SU-2019:1147-1
Security update for openssl-1_1

SUSE-SU-2019:0787-1
Security update for openssl-1_1

SUSE-SU-2019:0678-1
Security update for openssl-1_1
GHSA-qpgr-gj53-5m6w
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

BDU:2019-01289
Уязвимость библиотеки OpenSSL, связанная с ошибками криптографических преобразований, позволяющая нарушителю раскрыть защищаемую информацию

SUSE-SU-2019:1553-1
Security update for openssl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | openSUSE-SU-2018:3903-1 Security update for openssl | больше 6 лет назад | ||
![]() | SUSE-SU-2018:4001-1 Security update for openssl-1_0_0 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3989-1 Security update for openssl-1_0_0 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3866-1 Security update for openssl | больше 6 лет назад | ||
ELSA-2019-2304 ELSA-2019-2304: openssl security and bug fix update (MODERATE) | почти 6 лет назад | |||
![]() | openSUSE-SU-2018:4104-1 Security update for compat-openssl098 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:4274-1 Security update for openssl | больше 6 лет назад | ||
![]() | SUSE-SU-2018:4068-1 Security update for compat-openssl098 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3964-1 Security update for openssl1 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3864-2 Security update for openssl | около 6 лет назад | ||
![]() | SUSE-SU-2018:3864-1 Security update for openssl | больше 6 лет назад | ||
![]() | openSUSE-SU-2019:1814-1 Security update for virtualbox | почти 6 лет назад | ||
GHSA-4fhm-44hf-3465 The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1). | CVSS3: 5.9 | 8% Низкий | около 3 лет назад | |
![]() | BDU:2019-01881 Уязвимость реализации алгоритма шифрования ECDSA библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.9 | 8% Низкий | больше 6 лет назад |
![]() | openSUSE-SU-2019:1147-1 Security update for openssl-1_1 | 4% Низкий | около 6 лет назад | |
![]() | SUSE-SU-2019:0787-1 Security update for openssl-1_1 | 4% Низкий | около 6 лет назад | |
![]() | SUSE-SU-2019:0678-1 Security update for openssl-1_1 | 4% Низкий | около 6 лет назад | |
GHSA-qpgr-gj53-5m6w ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of... | CVSS3: 7.4 | 4% Низкий | около 3 лет назад | |
![]() | BDU:2019-01289 Уязвимость библиотеки OpenSSL, связанная с ошибками криптографических преобразований, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 3.7 | 4% Низкий | больше 6 лет назад |
![]() | SUSE-SU-2019:1553-1 Security update for openssl | около 6 лет назад |
Уязвимостей на страницу