Download
| Alert*
oval:org.secpod.oval:def:93586
The host is missing a patch containing a security fixes, which affects the following package(s): openssl.base oval:org.secpod.oval:def:97272 The remote host is missing a patch 151912-23 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:97273 The remote host is missing a patch 151913-23 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:3301535 Security update for openssl-1_0_0 oval:org.secpod.oval:def:91638 The host is installed with OpenSSL 1.0.2 before 1.0.2zi, 1.1.1 before 1.1.1v, 3.0.0 before 3.0.10 or 3.1.0 before 3.1.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the functions DH_check(), DH_check_ex() or EVP_PKEY_param_ch ... oval:org.secpod.oval:def:19500367 Issue summary: The AES-SIV cipher implementation contains a bug that causesit to ignore empty associated data entries which are unauthenticated asa consequence.Impact summary: Applications that use the AES-SIV algorithm and want toauthenticate empty data entries as associated data can be mislead by ... oval:org.secpod.oval:def:89049828 This update for openssl-1_1 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value oval:org.secpod.oval:def:89049824 This update for openssl-1_1 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value oval:org.secpod.oval:def:1701602 Issue summary: Checking excessively long DH keys or parameters may be very slow.Impact summary: Applications that use the functions DH_check, DH_check_exor EVP_PKEY_param_check to check a DH key or DH parameters may experience longdelays. Where the key or parameters that are being checked have been ... oval:org.secpod.oval:def:89049246 This update for openssl-1_1 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value oval:org.secpod.oval:def:89049222 This update for openssl-1_1 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value oval:org.secpod.oval:def:89049244 This update for openssl-3 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value oval:org.secpod.oval:def:708549 openssl: Secure Socket Layer cryptographic library and tools Details: USN-6435-1 fixed vulnerabilities in OpenSSL. This update provides the corresponding updates for Ubuntu 20.04 LTS. Original advisory OpenSSL could be made to consume resources and cause long delays if it processed certain input. oval:org.secpod.oval:def:89049264 This update for openssl-1_0_0 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value oval:org.secpod.oval:def:2108313 Oracle Solaris 11 - ( CVE-2023-2975 ) oval:org.secpod.oval:def:3301944 Security update for openssl-1_1 oval:org.secpod.oval:def:1701827 Issue summary: Checking excessively long DH keys or parameters may be very slow.Impact summary: Applications that use the functions DH_check, DH_check_exor EVP_PKEY_param_check to check a DH key or DH parameters may experience longdelays. Where the key or parameters that are being checked have been ... oval:org.secpod.oval:def:95067 openssl: Secure Socket Layer cryptographic library and tools Details: USN-6435-1 fixed vulnerabilities in OpenSSL. This update provides the corresponding updates for Linux Mint 20.x LTS. Original advisory OpenSSL could be made to consume resources and cause long delays if it processed certain input ... oval:org.secpod.oval:def:1701599 Issue summary: Checking excessively long DH keys or parameters may be very slow.Impact summary: Applications that use the functions DH_check, DH_check_exor EVP_PKEY_param_check to check a DH key or DH parameters may experience longdelays. Where the key or parameters that are being checked have been ... oval:org.secpod.oval:def:1701539 Issue summary: Checking excessively long DH keys or parameters may be very slow.Impact summary: Applications that use the functions DH_check, DH_check_exor EVP_PKEY_param_check to check a DH key or DH parameters may experience longdelays. Where the key or parameters that are being checked have been ... oval:org.secpod.oval:def:89049239 This update for openssl-3 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value oval:org.secpod.oval:def:1601814 Issue summary: Checking excessively long DH keys or parameters may be very slow.Impact summary: Applications that use the functions DH_check, DH_check_exor EVP_PKEY_param_check to check a DH key or DH parameters may experience longdelays. Where the key or parameters that are being checked have been ... oval:org.secpod.oval:def:89049278 This update for openssl-1_0_0 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value oval:org.secpod.oval:def:89049297 This update for openssl-1_1 fixes the following issues: * CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. * Don"t pass zero length input to EVP_Cipher because s390x assembler optimized AES cannot handle zero size oval:org.secpod.oval:def:508135 OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Security Fix: openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter ... oval:org.secpod.oval:def:2501288 OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. oval:org.secpod.oval:def:1507220 [1:1.1.1k-12] - Backport implicit rejection mechanism for RSA PKCS#1 v1.5 to RHEL-8 series Resolves: RHEL-17696 [1:1.1.1k-11] - Fix CVE-2023-5678: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow Resolves: RHEL-16538 [1:1.1.1k-10] - ... oval:org.secpod.oval:def:89051005 This update for openssl-3 fixes the following issues: * CVE-2023-5363: Incorrect cipher key and IV length processing. * CVE-2023-3817: Add test of DH_check with q = p + 1 oval:org.secpod.oval:def:94194 openssl: Secure Socket Layer cryptographic library and tools Several security issues were fixed in OpenSSL. oval:org.secpod.oval:def:1507278 [1:3.0.7-25.0.1] - Replace upstream references [Orabug: 34340177] [1:3.0.7-25] - Provide relevant diagnostics when FIPS checksum is corrupted Resolves: RHEL-5317 - Don"t limit using SHA1 in KDFs in non-FIPS mode. Resolves: RHEL-5295 - Provide empty evp_properties section in main OpenSSL configuratio ... oval:org.secpod.oval:def:96485 openssl: Secure Socket Layer cryptographic library and tools Several security issues were fixed in OpenSSL. oval:org.secpod.oval:def:89051006 This update for openssl-3 fixes the following issues: * CVE-2023-5363: Incorrect cipher key and IV length processing. * CVE-2023-3817: Add test of DH_check with q = p + 1 oval:org.secpod.oval:def:3302021 Security update for openssl-3 oval:org.secpod.oval:def:509252 OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Security Fix: openssl: AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries openssl ... oval:org.secpod.oval:def:2600576 OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. oval:org.secpod.oval:def:1702213 A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability. ... |