Search CVE reports


Toggle filters

31 – 40 of 120 results


CVE-2023-45232

Medium priority

Some fixes available 3 of 6

EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and...

1 affected package

edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Fixed Fixed Needs evaluation
Show less packages

CVE-2023-45231

Medium priority

Some fixes available 3 of 6

EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing  Neighbor Discovery Redirect message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially...

1 affected package

edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Fixed Fixed Needs evaluation
Show less packages

CVE-2023-45230

Medium priority

Some fixes available 3 of 6

EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss...

1 affected package

edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Fixed Fixed Needs evaluation
Show less packages

CVE-2023-45229

Medium priority
Vulnerable

EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access...

1 affected package

edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Vulnerable Vulnerable Needs evaluation
Show less packages

CVE-2023-3817

Low priority

Some fixes available 6 of 16

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may...

4 affected packages

openssl1.0, nodejs, edk2, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not in release Fixed
nodejs Not affected Vulnerable Not affected Not affected
edk2 Vulnerable Vulnerable Vulnerable Needs evaluation
openssl Not affected Fixed Fixed Fixed
Show less packages

CVE-2023-3446

Low priority

Some fixes available 7 of 19

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may...

4 affected packages

openssl1.0, nodejs, edk2, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not in release Fixed
nodejs Not affected Vulnerable Not affected Not affected
edk2 Vulnerable Vulnerable Vulnerable Needs evaluation
openssl Not affected Fixed Fixed Fixed
Show less packages

CVE-2023-2975

Low priority

Some fixes available 2 of 4

Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Not affected
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2023-2650

Medium priority

Some fixes available 13 of 20

Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP,...

4 affected packages

openssl, openssl1.0, edk2, nodejs

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed Fixed Fixed Fixed
openssl1.0 Not in release Not in release Not in release Fixed
edk2 Not affected Vulnerable Vulnerable Needs evaluation
nodejs Not affected Fixed Not affected Not affected
Show less packages

CVE-2023-1255

Low priority

Some fixes available 7 of 8

Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm...

4 affected packages

openssl1.0, edk2, nodejs, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not in release Not affected
edk2 Not affected Not affected Not affected Not affected
nodejs Not affected Vulnerable Not affected Not affected
openssl Fixed Fixed Not affected Not affected
Show less packages

CVE-2023-0466

Negligible priority

Some fixes available 12 of 20

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows...

4 affected packages

edk2, nodejs, openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Vulnerable Vulnerable Needs evaluation
nodejs Not affected Vulnerable Not affected Not affected
openssl Fixed Fixed Fixed Fixed
openssl1.0 Not in release Not in release Not in release Fixed
Show less packages