Search CVE reports
1 – 10 of 448 results
JRuby-OpenSSL is an add-on gem for JRuby that emulates the Ruby OpenSSL native library. Starting in JRuby-OpenSSL version 0.12.1 and prior to version 0.15.4 (corresponding to JRuby versions starting in 9.3.4.0 prior to 9.4.12.1...
1 affected package
jruby-openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
jruby-openssl | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
A flaw was found in OpenSSL’s handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to...
1 affected package
rust-openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
rust-openssl | Needs evaluation | Needs evaluation | Needs evaluation | — |
Some fixes available 5 of 12
In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.
2 affected packages
openssh, openssh-ssh1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssh | Fixed | Fixed | Fixed | Vulnerable |
openssh-ssh1 | Ignored | Ignored | Needs evaluation | Needs evaluation |
OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
openssl1.0 | Not in release | Not in release | — | Needs evaluation |
nodejs | Not affected | Vulnerable | Not affected | Needs evaluation |
edk2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has...
2 affected packages
openssh, openssh-ssh1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssh | Fixed | Not affected | Not affected | Not affected |
openssh-ssh1 | Not affected | Not affected | Not affected | Not affected |
Some fixes available 7 of 13
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles...
2 affected packages
openssh, openssh-ssh1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssh | Fixed | Fixed | Fixed | Fixed |
openssh-ssh1 | Ignored | Ignored | Ignored | Ignored |
rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument’s buffer but with a lifetime bound to the `client`...
2 affected packages
rust-openssl, rust-openssl-sys
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
rust-openssl | Needs evaluation | Needs evaluation | Needs evaluation | — |
rust-openssl-sys | Needs evaluation | Needs evaluation | Needs evaluation | — |
Some fixes available 4 of 18
Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an...
4 affected packages
edk2, openssl, openssl1.0, nodejs
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
openssl | Fixed | Fixed | Fixed | Needs evaluation |
openssl1.0 | Not in release | Not in release | Not in release | Needs evaluation |
nodejs | Not affected | Vulnerable | Not affected | Needs evaluation |
A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler...
2 affected packages
openssh, openssh-ssh1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssh | Not affected | Not affected | Not affected | Not affected |
openssh-ssh1 | Not affected | Not affected | Not affected | Not affected |