[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:63271
Bernd Edlinger discovered that malformed data passed to the SSL_check_chain function during or after a TLS 1.3 handshake could cause a NULL dereference, resulting in denial of service. The oldstable distribution is not affected.

oval:org.secpod.oval:def:1801708
changed the descriptionchanged the descriptionmade the issue visible to everyone

oval:org.secpod.oval:def:118191
The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.

oval:org.secpod.oval:def:91397
Solaris 11 - (CVE-2020-1967).

oval:org.secpod.oval:def:89000083
This update for openssl-1_1 fixes the following issues: - CVE-2020-1967: Fixed a denial of service via NULL pointer dereference in SSL_check_chain .

oval:org.secpod.oval:def:604809
Bernd Edlinger discovered that malformed data passed to the SSL_check_chain function during or after a TLS 1.3 handshake could cause a NULL dereference, resulting in denial of service. The oldstable distribution is not affected.

oval:org.secpod.oval:def:62818
The host is installed with OpenSSL 1.1.1d through 1.1.1f or Oracle MySQL Server through 5.6.48, 5.7.30 or 8.0.20 and is prone to a remote denial of service vulnerability. A flaw is present in the application which fails to handle an issue in the SSL_check_chain function. Successful exploitation allo ...

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:openssl:openssl
cpe:/a:oracle:mysql
CWE    1
CWE-476
*CVE
CVE-2020-1967

© SecPod Technologies