Количество 12
Количество 12
BDU:2026-01212
Уязвимость параметра max_cert_list сжатия сертификатов в TLS 1.3 библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2025-66199
Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (bro...
CVE-2025-66199
Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (bro
CVE-2025-66199
Issue summary: A TLS 1.3 connection using certificate compression can ...
GHSA-5888-36j9-c92p
Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (...
openSUSE-SU-2026:20152-1
Security update for openssl-3
RLSA-2026:1472
Important: openssl security update
ELSA-2026-50081
ELSA-2026-50081: openssl security update (IMPORTANT)
ELSA-2026-50080
ELSA-2026-50080: openssl security update (IMPORTANT)
ELSA-2026-50075
ELSA-2026-50075: openssl security update (IMPORTANT)
ELSA-2026-1473
ELSA-2026-1473: openssl security update (IMPORTANT)
ELSA-2026-1472
ELSA-2026-1472: openssl security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2026-01212 Уязвимость параметра max_cert_list сжатия сертификатов в TLS 1.3 библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.9 | 0% Низкий | 3 месяца назад | |
CVE-2025-66199 Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (bro... | CVSS3: 5.9 | 0% Низкий | 14 дней назад | |
CVE-2025-66199 Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (bro | CVSS3: 5.9 | 0% Низкий | 14 дней назад | |
CVE-2025-66199 Issue summary: A TLS 1.3 connection using certificate compression can ... | CVSS3: 5.9 | 0% Низкий | 14 дней назад | |
GHSA-5888-36j9-c92p Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (... | CVSS3: 5.9 | 0% Низкий | 14 дней назад | |
openSUSE-SU-2026:20152-1 Security update for openssl-3 | 8 дней назад | |||
RLSA-2026:1472 Important: openssl security update | 10 дней назад | |||
ELSA-2026-50081 ELSA-2026-50081: openssl security update (IMPORTANT) | 11 дней назад | |||
ELSA-2026-50080 ELSA-2026-50080: openssl security update (IMPORTANT) | 11 дней назад | |||
ELSA-2026-50075 ELSA-2026-50075: openssl security update (IMPORTANT) | 12 дней назад | |||
ELSA-2026-1473 ELSA-2026-1473: openssl security update (IMPORTANT) | 13 дней назад | |||
ELSA-2026-1472 ELSA-2026-1472: openssl security update (IMPORTANT) | 13 дней назад |
Уязвимостей на страницу