Количество 75
Количество 75
SUSE-SU-2023:0307-1
Security update for openssl1
SUSE-SU-2023:0306-1
Security update for openssl-1_0_0
SUSE-SU-2023:0305-2
Security update for openssl-1_0_0
SUSE-SU-2023:0305-1
Security update for openssl-1_0_0
BDU:2023-00675
Уязвимость функции BIO_new_NDEF() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20230418-05
Множественные уязвимости OpenSSL
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ...
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ...
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ap
CVE-2023-0286
X.400 address type confusion in X.509 GeneralName
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address proc ...
SUSE-SU-2023:0482-1
Security update for openssl-1_1-livepatches
RLSA-2025:7937
Important: compat-openssl11 security update
RLSA-2025:7895
Important: compat-openssl10 security update
GHSA-x4qr-2fvf-3mr5
Vulnerable OpenSSL included in cryptography wheels
ELSA-2025-7937
ELSA-2025-7937: compat-openssl11 security update (IMPORTANT)
ELSA-2025-7895
ELSA-2025-7895: compat-openssl10 security update (IMPORTANT)
ELSA-2023-1335
ELSA-2023-1335: openssl security update (IMPORTANT)
ELSA-2023-12326
ELSA-2023-12326: openssl security update (IMPORTANT)
ELSA-2023-12297
ELSA-2023-12297: openssl security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2023:0307-1 Security update for openssl1 | почти 3 года назад | |||
SUSE-SU-2023:0306-1 Security update for openssl-1_0_0 | почти 3 года назад | |||
SUSE-SU-2023:0305-2 Security update for openssl-1_0_0 | почти 3 года назад | |||
SUSE-SU-2023:0305-1 Security update for openssl-1_0_0 | почти 3 года назад | |||
BDU:2023-00675 Уязвимость функции BIO_new_NDEF() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.3 | 1% Низкий | около 3 лет назад | |
ROS-20230418-05 Множественные уязвимости OpenSSL | CVSS3: 7.5 | почти 3 года назад | ||
CVE-2023-0286 There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ... | CVSS3: 7.4 | 81% Высокий | почти 3 года назад | |
CVE-2023-0286 There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ... | CVSS3: 7.4 | 81% Высокий | почти 3 года назад | |
CVE-2023-0286 There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ap | CVSS3: 7.4 | 81% Высокий | почти 3 года назад | |
CVE-2023-0286 X.400 address type confusion in X.509 GeneralName | CVSS3: 7.4 | 81% Высокий | почти 3 года назад | |
CVE-2023-0286 There is a type confusion vulnerability relating to X.400 address proc ... | CVSS3: 7.4 | 81% Высокий | почти 3 года назад | |
SUSE-SU-2023:0482-1 Security update for openssl-1_1-livepatches | 81% Высокий | почти 3 года назад | ||
RLSA-2025:7937 Important: compat-openssl11 security update | 81% Высокий | 4 месяца назад | ||
RLSA-2025:7895 Important: compat-openssl10 security update | 81% Высокий | 6 месяцев назад | ||
GHSA-x4qr-2fvf-3mr5 Vulnerable OpenSSL included in cryptography wheels | CVSS3: 7.4 | 81% Высокий | почти 3 года назад | |
ELSA-2025-7937 ELSA-2025-7937: compat-openssl11 security update (IMPORTANT) | 9 месяцев назад | |||
ELSA-2025-7895 ELSA-2025-7895: compat-openssl10 security update (IMPORTANT) | 9 месяцев назад | |||
ELSA-2023-1335 ELSA-2023-1335: openssl security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2023-12326 ELSA-2023-12326: openssl security update (IMPORTANT) | почти 3 года назад | |||
ELSA-2023-12297 ELSA-2023-12297: openssl security update (IMPORTANT) | почти 3 года назад |
Уязвимостей на страницу