UbuntuUpdates.org

Bugs fixes in "openssl"

Origin Bug number Title Date fixed
CVE CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory con 2024-07-31
CVE CVE-2024-4741 Use After Free with SSL_free_buffers 2024-07-31
CVE CVE-2024-2511 Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An atta 2024-07-31
CVE CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory con 2024-07-31
CVE CVE-2024-4741 Use After Free with SSL_free_buffers 2024-07-31
CVE CVE-2024-4603 Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param 2024-07-31
CVE CVE-2024-2511 Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An atta 2024-07-31
CVE CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory con 2024-07-31
CVE CVE-2024-4741 Use After Free with SSL_free_buffers 2024-07-31
CVE CVE-2024-4603 Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param 2024-07-31
CVE CVE-2024-2511 Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An atta 2024-07-31
CVE CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory con 2024-07-31
CVE CVE-2024-4741 Use After Free with SSL_free_buffers 2024-07-31
CVE CVE-2024-2511 Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An atta 2024-07-31
CVE CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory con 2024-07-31
CVE CVE-2024-4741 Use After Free with SSL_free_buffers 2024-07-31
CVE CVE-2024-4603 Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param 2024-07-31
CVE CVE-2024-2511 Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An atta 2024-07-31
CVE CVE-2024-5535 Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory con 2024-07-31
CVE CVE-2024-4741 Use After Free with SSL_free_buffers 2024-07-31



About   -   Send Feedback to @ubuntu_updates