Количество 14
Количество 14

CVE-2015-3216
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.

CVE-2015-3216
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.

CVE-2015-3216
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
CVE-2015-3216
Race condition in a certain Red Hat patch to the PRNG lock implementat ...
GHSA-3522-gq68-vxp6
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.

BDU:2015-11041
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2015-1115
ELSA-2015-1115: openssl security update (MODERATE)

SUSE-SU-2015:1150-1
Security update for compat-openssl098

SUSE-SU-2015:1143-1
Security update for openssl

SUSE-SU-2015:1182-2
Security update for OpenSSL

SUSE-SU-2015:0545-2
Security update for OpenSSL

SUSE-SU-2015:1184-2
Security update for OpenSSL

SUSE-SU-2015:0545-1
Security update for OpenSSL

SUSE-SU-2015:1184-1
Security update for OpenSSL
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2015-3216 Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field. | CVSS2: 4.3 | 1% Низкий | около 10 лет назад |
![]() | CVE-2015-3216 Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field. | CVSS2: 4.3 | 1% Низкий | около 10 лет назад |
![]() | CVE-2015-3216 Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field. | CVSS2: 4.3 | 1% Низкий | около 10 лет назад |
CVE-2015-3216 Race condition in a certain Red Hat patch to the PRNG lock implementat ... | CVSS2: 4.3 | 1% Низкий | около 10 лет назад | |
GHSA-3522-gq68-vxp6 Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field. | 1% Низкий | около 3 лет назад | ||
![]() | BDU:2015-11041 Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS2: 4.3 | 1% Низкий | около 10 лет назад |
ELSA-2015-1115 ELSA-2015-1115: openssl security update (MODERATE) | около 10 лет назад | |||
![]() | SUSE-SU-2015:1150-1 Security update for compat-openssl098 | около 10 лет назад | ||
![]() | SUSE-SU-2015:1143-1 Security update for openssl | около 10 лет назад | ||
![]() | SUSE-SU-2015:1182-2 Security update for OpenSSL | почти 11 лет назад | ||
![]() | SUSE-SU-2015:0545-2 Security update for OpenSSL | почти 11 лет назад | ||
![]() | SUSE-SU-2015:1184-2 Security update for OpenSSL | больше 12 лет назад | ||
![]() | SUSE-SU-2015:0545-1 Security update for OpenSSL | больше 12 лет назад | ||
![]() | SUSE-SU-2015:1184-1 Security update for OpenSSL | почти 11 лет назад |
Уязвимостей на страницу