Lucene search

K

Medium: openssl

🗓️ 23 Feb 2021 20:00:18Reported by AmazonType 
amazon
 amazon
🔗 alas.aws.amazon.com👁 56 Views

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer. X509_issuer_and_serial_hash() doesn't handle parsing errors, causing potential denial of service. Update openssl to fix vulnerabilities

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Amazon Linux1i686openssl-devel1.0.2k-16.153.amzn1openssl-devel-1.0.2k-16.153.amzn1.i686.rpm
Amazon Linux1i686openssl-perl1.0.2k-16.153.amzn1openssl-perl-1.0.2k-16.153.amzn1.i686.rpm
Amazon Linux1i686openssl-debuginfo1.0.2k-16.153.amzn1openssl-debuginfo-1.0.2k-16.153.amzn1.i686.rpm
Amazon Linux1i686openssl1.0.2k-16.153.amzn1openssl-1.0.2k-16.153.amzn1.i686.rpm
Amazon Linux1i686openssl-static1.0.2k-16.153.amzn1openssl-static-1.0.2k-16.153.amzn1.i686.rpm
Amazon Linux1x86_64openssl-static1.0.2k-16.153.amzn1openssl-static-1.0.2k-16.153.amzn1.x86_64.rpm
Amazon Linux1x86_64openssl-devel1.0.2k-16.153.amzn1openssl-devel-1.0.2k-16.153.amzn1.x86_64.rpm
Amazon Linux1x86_64openssl-perl1.0.2k-16.153.amzn1openssl-perl-1.0.2k-16.153.amzn1.x86_64.rpm
Amazon Linux1x86_64openssl1.0.2k-16.153.amzn1openssl-1.0.2k-16.153.amzn1.x86_64.rpm
Amazon Linux1x86_64openssl-debuginfo1.0.2k-16.153.amzn1openssl-debuginfo-1.0.2k-16.153.amzn1.x86_64.rpm
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Feb 2021 20:18Current
7.5High risk
Vulners AI Score7.5
CVSS25
CVSS37.5
EPSS0.023
SSVC
56
.json
Report