Search CVE reports


Toggle filters

61 – 70 of 453 results


CVE-2022-4304

Medium priority

Some fixes available 11 of 20

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an...

4 affected packages

openssl, nodejs, edk2, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed Fixed Fixed Fixed
nodejs Not affected Fixed Not affected Not affected
edk2 Not affected Needs evaluation Needs evaluation Needs evaluation
openssl1.0 Not in release Not in release Ignored
Show less packages

CVE-2022-4203

Medium priority
Fixed

A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the...

4 affected packages

edk2, nodejs, openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Not affected Not affected
nodejs Not affected Not affected Not affected
openssl Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not affected
Show less packages

CVE-2023-25136

Medium priority
Needs evaluation

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the...

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh Not affected Not affected Not affected Needs evaluation
openssh-ssh1 Not affected Not affected Not affected Not affected
Show less packages

CVE-2022-3996

Low priority

Some fixes available 8 of 9

If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of...

4 affected packages

edk2, nodejs, openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Not affected Not affected Not affected
nodejs Not affected Not affected Not affected Not affected
openssl Fixed Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not affected
Show less packages

CVE-2022-40735

Medium priority

Some fixes available 1 of 6

The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that "(appropriately) short exponents"...

4 affected packages

openssl, openssl1.0, edk2, nodejs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not in release Not affected
edk2 Not affected Not affected Not affected Not affected
nodejs Not affected Vulnerable Not affected Not affected
Show less packages

CVE-2022-3786

High priority

Some fixes available 8 of 9

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a...

4 affected packages

openssl1.0, edk2, nodejs, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not affected
edk2 Not affected Not affected Not affected Not affected
nodejs Not affected Not affected Not affected Not affected
openssl Fixed Fixed Not affected Not affected
Show less packages

CVE-2022-3602

High priority

Some fixes available 8 of 9

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the...

4 affected packages

edk2, nodejs, openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Not affected Not affected Not affected
nodejs Not affected Not affected Not affected Not affected
openssl Fixed Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not affected
Show less packages

CVE-2022-3479

Low priority
Fixed

A vulnerability found in nss. By this security vulnerability, nss client auth crash without a user certificate in the database and this can lead us to a segmentation fault or crash.

1 affected package

nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nss Not affected Not affected Not affected
Show less packages

CVE-2022-3358

Low priority

Some fixes available 8 of 9

OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new...

4 affected packages

edk2, nodejs, openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Not affected Not affected Not affected
nodejs Not affected Not affected Not affected Not affected
openssl Fixed Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not affected
Show less packages

CVE-2021-3601

Negligible priority
Not affected

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. OpenSSL does not class this issue as a security vulnerability. The trusted CA store should not contain anything...

2 affected packages

openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not affected
Show less packages