Search CVE reports
1 – 10 of 453 results
ssh in OpenSSH before 10.1 allows the ‘\0’ character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
2 affected packages
openssh, openssh-ssh1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssh | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
openssh-ssh1 | Ignored | Ignored | Ignored | Needs evaluation |
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command...
2 affected packages
openssh, openssh-ssh1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssh | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
openssh-ssh1 | Ignored | Ignored | Ignored | Needs evaluation |
Some fixes available 1 of 5
Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the ‘no_proxy’ environment variable is set and the host portion of the authority component of the HTTP URL is an...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | — | Not affected |
nodejs | Not affected | Vulnerable | Not affected | Needs evaluation |
edk2 | Not affected | Not affected | Not affected | Not affected |
Some fixes available 1 of 4
Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | — | Not affected |
nodejs | Not affected | Vulnerable | Not affected | Needs evaluation |
edk2 | Not affected | Not affected | Not affected | Not affected |
Some fixes available 8 of 11
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Fixed | Fixed |
openssl1.0 | Not in release | Not in release | — | Fixed |
nodejs | Not affected | Vulnerable | Not affected | Needs evaluation |
edk2 | Not affected | Not affected | Not affected | Not affected |
The openssl crate before 0.10.55 for Rust allows an out-of-bounds read via an empty string to X509VerifyParamRef::set_host.
1 affected package
rust-openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
rust-openssl | Needs evaluation | Needs evaluation | Needs evaluation | — |
OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
openssl1.0 | Not in release | Not in release | — | Needs evaluation |
nodejs | Not affected | Vulnerable | Not affected | Needs evaluation |
edk2 | Not affected | Not affected | Not affected | Not affected |
Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
JRuby-OpenSSL is an add-on gem for JRuby that emulates the Ruby OpenSSL native library. Starting in JRuby-OpenSSL version 0.12.1 and prior to version 0.15.4 (corresponding to JRuby versions starting in 9.3.4.0 prior to 9.4.12.1...
1 affected package
jruby-openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
jruby-openssl | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Some fixes available 5 of 12
In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.
2 affected packages
openssh, openssh-ssh1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssh | Fixed | Fixed | Fixed | Vulnerable |
openssh-ssh1 | Ignored | Ignored | Needs evaluation | Needs evaluation |