Количество 19
Количество 19

CVE-2024-4741
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arr...

CVE-2024-4741
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrive...

CVE-2024-4741
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrive

CVE-2024-4741
CVE-2024-4741
Issue summary: Calling the OpenSSL API function SSL_free_buffers may c ...

SUSE-SU-2024:2271-1
Security update for openssl-1_1-livepatches

SUSE-SU-2024:2197-1
Security update for openssl-1_1-livepatches

SUSE-SU-2024:2089-1
Security update for openssl-1_1

SUSE-SU-2024:2088-1
Security update for openssl-3

SUSE-SU-2024:2059-1
Security update for openssl-1_1

SUSE-SU-2024:2051-1
Security update for openssl-1_1

SUSE-SU-2024:2036-1
Security update for openssl-1_1

SUSE-SU-2024:2035-1
Security update for openssl-1_1

SUSE-SU-2024:2020-1
Security update for openssl-3

ROS-20240704-04
Уязвимость openssl3
GHSA-6vgq-8qjq-h578
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arr...

BDU:2024-05176
Уязвимость функции SSL_free_buffers() криптографической библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

SUSE-SU-2024:2066-1
Security update for openssl-3
ELSA-2024-9333
ELSA-2024-9333: openssl and openssl-fips-provider security update (LOW)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-4741 Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arr... | CVSS3: 7.5 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-4741 Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrive... | CVSS3: 5.6 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-4741 Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrive | CVSS3: 7.5 | 0% Низкий | 8 месяцев назад |
![]() | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
CVE-2024-4741 Issue summary: Calling the OpenSSL API function SSL_free_buffers may c ... | CVSS3: 7.5 | 0% Низкий | 8 месяцев назад | |
![]() | SUSE-SU-2024:2271-1 Security update for openssl-1_1-livepatches | 0% Низкий | 12 месяцев назад | |
![]() | SUSE-SU-2024:2197-1 Security update for openssl-1_1-livepatches | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2089-1 Security update for openssl-1_1 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2088-1 Security update for openssl-3 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2059-1 Security update for openssl-1_1 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2051-1 Security update for openssl-1_1 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2036-1 Security update for openssl-1_1 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2035-1 Security update for openssl-1_1 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2020-1 Security update for openssl-3 | 0% Низкий | около 1 года назад | |
![]() | ROS-20240704-04 Уязвимость openssl3 | CVSS3: 8.1 | 0% Низкий | 12 месяцев назад |
GHSA-6vgq-8qjq-h578 Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arr... | CVSS3: 7.5 | 0% Низкий | 8 месяцев назад | |
![]() | BDU:2024-05176 Уязвимость функции SSL_free_buffers() криптографической библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании | CVSS3: 8.1 | 0% Низкий | около 1 года назад |
![]() | SUSE-SU-2024:2066-1 Security update for openssl-3 | около 1 года назад | ||
ELSA-2024-9333 ELSA-2024-9333: openssl and openssl-fips-provider security update (LOW) | 8 месяцев назад |
Уязвимостей на страницу