Количество 49
Количество 49

SUSE-SU-2018:2928-2
Security update for openssl

SUSE-SU-2018:2928-1
Security update for openssl

SUSE-SU-2018:2492-1
Security update for openssl

SUSE-SU-2018:2486-1
Security update for openssl
GHSA-rj52-j648-hww8
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

BDU:2019-00021
Уязвимость алгоритма генерации RSA-ключа библиотеки OpenSSL, позволяющая нарушителю восстановить закрытый ключ

openSUSE-SU-2018:3013-1
Security update for openssl-1_1

openSUSE-SU-2018:2129-1
Security update for openssl-1_0_0

openSUSE-SU-2018:2117-1
Security update for openssl-1_1

openSUSE-SU-2018:1906-1
Security update for openssl

SUSE-SU-2018:2956-1
Security update for openssl-1_1

SUSE-SU-2018:2207-1
Security update for openssl

SUSE-SU-2018:2041-1
Security update for openssl-1_1

SUSE-SU-2018:2036-1
Security update for openssl-1_1

SUSE-SU-2018:1968-1
Security update for openssl

SUSE-SU-2018:1887-2
Security update for openssl

SUSE-SU-2018:1887-1
Security update for openssl
GHSA-497c-86pp-222m
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

BDU:2019-00186
Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2018:2855-1
Security update for nodejs8
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2018:2928-2 Security update for openssl | 28% Средний | больше 6 лет назад | |
![]() | SUSE-SU-2018:2928-1 Security update for openssl | 28% Средний | больше 6 лет назад | |
![]() | SUSE-SU-2018:2492-1 Security update for openssl | 28% Средний | почти 7 лет назад | |
![]() | SUSE-SU-2018:2486-1 Security update for openssl | 28% Средний | почти 7 лет назад | |
GHSA-rj52-j648-hww8 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | CVSS3: 5.9 | 28% Средний | около 3 лет назад | |
![]() | BDU:2019-00021 Уязвимость алгоритма генерации RSA-ключа библиотеки OpenSSL, позволяющая нарушителю восстановить закрытый ключ | CVSS3: 5.9 | 28% Средний | около 7 лет назад |
![]() | openSUSE-SU-2018:3013-1 Security update for openssl-1_1 | 81% Высокий | больше 6 лет назад | |
![]() | openSUSE-SU-2018:2129-1 Security update for openssl-1_0_0 | 81% Высокий | почти 7 лет назад | |
![]() | openSUSE-SU-2018:2117-1 Security update for openssl-1_1 | 81% Высокий | почти 7 лет назад | |
![]() | openSUSE-SU-2018:1906-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2956-1 Security update for openssl-1_1 | 81% Высокий | больше 6 лет назад | |
![]() | SUSE-SU-2018:2207-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2041-1 Security update for openssl-1_1 | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2036-1 Security update for openssl-1_1 | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:1968-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:1887-2 Security update for openssl | 81% Высокий | больше 6 лет назад | |
![]() | SUSE-SU-2018:1887-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
GHSA-497c-86pp-222m During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 81% Высокий | около 3 лет назад | |
![]() | BDU:2019-00186 Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 81% Высокий | около 7 лет назад |
![]() | openSUSE-SU-2018:2855-1 Security update for nodejs8 | больше 6 лет назад |
Уязвимостей на страницу