http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-...">Security update for openssl (important) - vulnerability database | Vulners.comhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-...">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-...">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-...">
Lucene search

K
suseSuseSUSE-SU-2012:0637-1
HistoryMay 23, 2012 - 1:08 a.m.

Security update for openssl (important)

2012-05-2301:08:20
lists.opensuse.org
9

0.11 Low

EPSS

Percentile

94.6%

This update of openssl fixes an integer conversation issue
which could cause a heap-based memory corruption
(CVE-2012-2110
<<a href=“http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110”>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110</a>
> ).

Additionally, a check for negative buffer length values was
added ( CVE-2012-2131
<<a href=“http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131”>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131</a>
> ) and a memory leak when creating public keys fixed.