Search CVE reports
21 – 30 of 448 results
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would...
1 affected package
libcrypt-openssl-rsa-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libcrypt-openssl-rsa-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Some fixes available 5 of 17
Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing side-channel in ECDSA signature computations could allow recovering...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Fixed | Needs evaluation |
openssl1.0 | Not in release | Not in release | Not in release | Needs evaluation |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
Some fixes available 10 of 21
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might...
4 affected packages
openssl1.0, nodejs, edk2, openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl1.0 | Not in release | Not in release | Not in release | Fixed |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Vulnerable | Vulnerable | Vulnerable | Needs evaluation |
openssl | Fixed | Fixed | Fixed | Fixed |
Some fixes available 5 of 10
Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Vulnerable | Not affected | Not affected | Not affected |
Some fixes available 4 of 21
Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121.
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Fixed | Ignored |
thunderbird | Not affected | Not affected | Not in release | Ignored |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs78 | Not in release | Ignored | Not in release | Not in release |
mozjs91 | Not in release | Ignored | Not in release | Not in release |
mozjs102 | Ignored | Ignored | Not in release | Not in release |
nss | Not affected | Fixed | Fixed | Needs evaluation |
Some fixes available 5 of 10
Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Vulnerable | Not affected | Not affected | Not affected |
Some fixes available 9 of 20
Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key...
4 affected packages
openssl1.0, nodejs, edk2, openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl1.0 | Not in release | Not in release | Not in release | Fixed |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Vulnerable | Vulnerable | Vulnerable | Needs evaluation |
openssl | Fixed | Fixed | Fixed | Fixed |
Some fixes available 7 of 20
NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and...
9 affected packages
nss, firefox, thunderbird, mozjs38, mozjs52...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
nss | Not affected | Fixed | Fixed | Vulnerable |
firefox | Not affected | Not affected | Fixed | — |
thunderbird | Not affected | Fixed | Fixed | — |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs78 | Not in release | Ignored | Not in release | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
Some fixes available 6 of 7
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |