Search CVE reports
61 – 70 of 448 results
Some fixes available 7 of 8
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the...
4 affected packages
edk2, nodejs, openssl, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Not affected | Not affected | Not affected | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
openssl | Fixed | Fixed | Not affected | Not affected |
openssl1.0 | — | Not in release | Not in release | Not affected |
A vulnerability found in nss. By this security vulnerability, nss client auth crash without a user certificate in the database and this can lead us to a segmentation fault or crash.
1 affected package
nss
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
nss | — | Not affected | Not affected | Not affected |
Some fixes available 11 of 13
Within the <code>lg_init()</code> function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox < 102.
3 affected packages
thunderbird, firefox, nss
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | — | Fixed | Fixed | Ignored |
firefox | — | Not affected | Fixed | Fixed |
nss | — | Fixed | Fixed | Fixed |
Some fixes available 7 of 8
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new...
4 affected packages
edk2, nodejs, openssl, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Not affected | Not affected | Not affected | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
openssl | Fixed | Fixed | Not affected | Not affected |
openssl1.0 | — | Not in release | Not in release | Not affected |
GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST...
1 affected package
libengine-gost-openssl1.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libengine-gost-openssl1.1 | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Some fixes available 22 of 33
After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable. This vulnerability affects Firefox ESR < 91.5,...
7 affected packages
firefox, mozjs38, mozjs52, mozjs68, mozjs78...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs78 | Not in release | Ignored | Not in release | Not in release |
nss | Not affected | Not affected | Fixed | Fixed |
thunderbird | Fixed | Fixed | Fixed | Fixed |
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and...
4 affected packages
edk2, nodejs, openssl, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Not affected | Not affected | Not affected | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
openssl | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
Some fixes available 11 of 12
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the...
4 affected packages
edk2, nodejs, openssl, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Not affected | Not affected | Not affected | Not affected |
nodejs | Not affected | Fixed | Not affected | Not affected |
openssl | Fixed | Fixed | Fixed | Fixed |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
Some fixes available 8 of 9
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Not affected | Fixed | Fixed | Fixed |
openssl1.0 | Not in release | Not in release | Not in release | Fixed |
nodejs | Not affected | Fixed | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
Some fixes available 8 of 9
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived...
4 affected packages
edk2, nodejs, openssl, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Not affected | Not affected | Not affected | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
openssl | Fixed | Fixed | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |