7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.008 Low
EPSS
Percentile
82.0%
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may
overflow the output length argument in some cases where the input length is
close to the maximum permissable length for an integer on the platform. In
such cases the return value from the function call will be 1 (indicating
success), but the output length value will be negative. This could cause
applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and
below are affected by this issue. Users of these versions should upgrade to
OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this
issue. However OpenSSL 1.0.2 is out of support and no longer receiving
public updates. Premium support customers of OpenSSL 1.0.2 should upgrade
to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j
(Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
Author | Note |
---|---|
mdeslaur | edk2 doesn’t use EVP_CipherUpdate, EVP_EncryptUpdate, or EVP_DecryptUpdate, so it doesn’t appear vulnerable to this issue edk2 upstream says EVP_DecryptUpdate is used by drivers |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | edk2 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | edk2 | < 0~20191122.bd85bf54-2ubuntu3.3 | UNKNOWN |
ubuntu | 21.04 | noarch | edk2 | < 2020.11-4ubuntu0.1 | UNKNOWN |
ubuntu | 16.04 | noarch | edk2 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | nodejs | < any | UNKNOWN |
ubuntu | 18.04 | noarch | openssl | < 1.1.1-1ubuntu2.1~18.04.8 | UNKNOWN |
ubuntu | 20.04 | noarch | openssl | < 1.1.1f-1ubuntu2.2 | UNKNOWN |
ubuntu | 20.10 | noarch | openssl | < 1.1.1f-1ubuntu4.2 | UNKNOWN |
ubuntu | 21.04 | noarch | openssl | < 1.1.1j-1ubuntu1 | UNKNOWN |
ubuntu | 21.10 | noarch | openssl | < 1.1.1j-1ubuntu1 | UNKNOWN |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.008 Low
EPSS
Percentile
82.0%