Search CVE reports


Toggle filters

91 – 100 of 448 results


CVE-2020-36325

Medium priority
Not affected

An issue was discovered in Jansson through 2.13.1. Due to a parsing error in json_loads, there's an out-of-bounds read-access bug. NOTE: the vendor reports that this only occurs when a programmer fails to follow the API specification

1 affected package

jansson

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
jansson Not affected Not affected Not affected Not affected
Show less packages

CVE-2020-25648

Low priority

Some fixes available 2 of 3

A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library....

1 affected package

nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nss Not affected Fixed Fixed
Show less packages

CVE-2020-1971

High priority
Fixed

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a...

4 affected packages

openssl, nodejs, openssl1.0, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed Fixed
nodejs Not affected Not affected
openssl1.0 Not in release Fixed
edk2 Not affected Not affected
Show less packages

CVE-2020-1968

Low priority

Some fixes available 3 of 4

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this...

4 affected packages

edk2, nodejs, openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Not affected Not affected Not affected
nodejs Not affected Not affected Not affected Not affected
openssl Not affected Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not in release Fixed
Show less packages

CVE-2020-1967

High priority
Fixed

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS...

3 affected packages

edk2, openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
edk2 Not affected Not affected
openssl Fixed Not affected
openssl1.0 Not in release Not affected
Show less packages

CVE-2020-15778

Low priority
Ignored

scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit...

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh Ignored Ignored
openssh-ssh1 Ignored Ignored
Show less packages

CVE-2020-14145

Low priority
Ignored

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key...

2 affected packages

openssh-ssh1, openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh-ssh1 Not affected Not affected Not affected
openssh Not affected Not affected Not affected
Show less packages

CVE-2020-12413

Low priority
Ignored

The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification. To mitigate this vulnerability, Firefox disabled support for DHE ciphersuites.

1 affected package

nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nss Not affected Not affected Not affected
Show less packages

CVE-2020-12403

Medium priority
Fixed

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20...

1 affected package

nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nss Fixed Fixed
Show less packages

CVE-2020-12402

Medium priority
Fixed

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side...

1 affected package

nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nss Fixed Fixed
Show less packages