Search CVE reports
101 – 110 of 271 results
CVE-2016-6306
Medium prioritySome fixes available 9 of 10
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2016-6303
Medium prioritySome fixes available 9 of 10
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other...
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2016-6302
Low prioritySome fixes available 9 of 10
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2016-2182
Low prioritySome fixes available 9 of 10
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly...
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2016-2181
Low prioritySome fixes available 9 of 10
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of...
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2016-2179
Low prioritySome fixes available 9 of 10
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption)...
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2016-2183
Low prioritySome fixes available 23 of 25
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain...
8 affected packages
gnutls26, gnutls28, nss, openjdk-6, openjdk-7...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Not affected | Not affected |
nss | — | — | — | Fixed | Fixed |
openjdk-6 | — | — | — | Not in release | Not in release |
openjdk-7 | — | — | — | Not in release | Not in release |
openjdk-8 | — | — | — | Not affected | Fixed |
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2016-2180
Low prioritySome fixes available 9 of 11
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read...
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2015-5738
Medium priorityThe RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private...
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | — | — |
openssl098 | — | — | — | — | — |
CVE-2016-2178
Low prioritySome fixes available 9 of 11
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a...
2 affected packages
openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |