Bugs fixes in "openssl"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2021-23841 | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl | 2021-02-18 |
CVE | CVE-2021-23840 | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl | 2021-02-18 |
CVE | CVE-2021-23841 | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl | 2021-02-18 |
CVE | CVE-2021-23840 | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl | 2021-02-18 |
CVE | CVE-2021-23841 | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl | 2021-02-18 |
CVE | CVE-2021-23840 | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is cl | 2021-02-18 |
CVE | CVE-2020-1971 | EDIPARTYNAME NULL pointer de-reference | 2020-12-08 |
CVE | CVE-2020-1971 | EDIPARTYNAME NULL pointer de-reference | 2020-12-08 |
CVE | CVE-2020-1971 | EDIPARTYNAME NULL pointer de-reference | 2020-12-08 |
CVE | CVE-2020-1971 | EDIPARTYNAME NULL pointer de-reference | 2020-12-08 |
CVE | CVE-2020-1971 | EDIPARTYNAME NULL pointer de-reference | 2020-12-08 |
CVE | CVE-2020-1971 | EDIPARTYNAME NULL pointer de-reference | 2020-12-08 |
CVE | CVE-2020-1968 | The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections | 2020-09-16 |
CVE | CVE-2020-1968 | The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections | 2020-09-16 |
CVE | CVE-2019-1563 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very l | 2020-05-28 |
CVE | CVE-2019-1551 | There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analy | 2020-05-28 |
CVE | CVE-2019-1547 | Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is po | 2020-05-28 |
CVE | CVE-2019-1563 | In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very l | 2020-05-28 |
CVE | CVE-2019-1551 | There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analy | 2020-05-28 |
CVE | CVE-2019-1547 | Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is po | 2020-05-28 |
About
-
Send Feedback to @ubuntu_updates