Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer. X509_issuer_and_serial_hash() doesn't handle parsing errors, causing potential denial of service. Update openssl to fix vulnerabilities
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Updated openssl and compat-openssl10 packages fix security vulnerabilities | 4 Mar 202119:53 | – | mageia |
![]() | SUSE SLES12 Security Update : compat-openssl098 (SUSE-SU-2021:0793-1) | 17 Mar 202100:00 | – | nessus |
![]() | Oracle Linux 8 : openssl (ELSA-2021-9561) | 23 Nov 202100:00 | – | nessus |
![]() | SUSE SLES15 Security Update : openssl-1_0_0 (SUSE-SU-2021:0769-1) | 12 Mar 202100:00 | – | nessus |
![]() | EulerOS 2.0 SP8 : compat-openssl10 (EulerOS-SA-2021-2456) | 24 Sep 202100:00 | – | nessus |
![]() | EulerOS 2.0 SP5 : openssl (EulerOS-SA-2021-1907) | 18 May 202100:00 | – | nessus |
![]() | CentOS 8 : openssl (CESA-2021:4424) | 11 Nov 202100:00 | – | nessus |
![]() | openSUSE Security Update : openssl-1_1 (openSUSE-2021-427) | 17 Mar 202100:00 | – | nessus |
![]() | EulerOS 2.0 SP8 : openssl (EulerOS-SA-2021-1882) | 18 May 202100:00 | – | nessus |
![]() | EulerOS 2.0 SP5 : openssl111d (EulerOS-SA-2021-1909) | 18 May 202100:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | openssl-devel | 1.0.2k-16.153.amzn1 | openssl-devel-1.0.2k-16.153.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssl-perl | 1.0.2k-16.153.amzn1 | openssl-perl-1.0.2k-16.153.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssl-debuginfo | 1.0.2k-16.153.amzn1 | openssl-debuginfo-1.0.2k-16.153.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssl | 1.0.2k-16.153.amzn1 | openssl-1.0.2k-16.153.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssl-static | 1.0.2k-16.153.amzn1 | openssl-static-1.0.2k-16.153.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | openssl-static | 1.0.2k-16.153.amzn1 | openssl-static-1.0.2k-16.153.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssl-devel | 1.0.2k-16.153.amzn1 | openssl-devel-1.0.2k-16.153.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssl-perl | 1.0.2k-16.153.amzn1 | openssl-perl-1.0.2k-16.153.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssl | 1.0.2k-16.153.amzn1 | openssl-1.0.2k-16.153.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssl-debuginfo | 1.0.2k-16.153.amzn1 | openssl-debuginfo-1.0.2k-16.153.amzn1.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo