Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP5:GA
patchinfo.27638
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.27638
<patchinfo incident="27638"> <issue tracker="bnc" id="1207541">VUL-0: EMBARGOED: CVE-2023-0401: openssl: NULL dereference during PKCS7 data verification</issue> <issue tracker="bnc" id="1195149">missing zlib support in openssl</issue> <issue tracker="bnc" id="1206222">SLES 15 SP4 - OpenSSL 3.0.x performance degradation on EDDSA, SHA3, and SHAKE</issue> <issue tracker="bnc" id="1207539">VUL-0: EMBARGOED: CVE-2023-0216: openssl: Invalid pointer dereference in d2i_PKCS7 functions</issue> <issue tracker="bnc" id="1207538">VUL-0: EMBARGOED: CVE-2022-4450: openssl: Double free after calling PEM_read_bio_ex</issue> <issue tracker="bnc" id="1207535">VUL-0: EMBARGOED: CVE-2022-4203: openssl: X.509 Name Constraints Read Buffer Overflow</issue> <issue tracker="bnc" id="1207534">VUL-0: EMBARGOED: CVE-2022-4304: openssl: Timing Oracle in RSA Decryption</issue> <issue tracker="bnc" id="1207536">VUL-0: EMBARGOED: CVE-2023-0215: openssl: Use-after-free following BIO_new_NDEF</issue> <issue tracker="bnc" id="1207533">VUL-0: EMBARGOED: CVE-2023-0286: openssl: X.400 address type confusion in X.509 GeneralName</issue> <issue tracker="bnc" id="1207540">VUL-0: EMBARGOED: CVE-2023-0217: openssl: NULL dereference validating DSA public key</issue> <issue tracker="cve" id="2023-0286"/> <issue tracker="cve" id="2023-0216"/> <issue tracker="cve" id="2022-4450"/> <issue tracker="cve" id="2023-0215"/> <issue tracker="cve" id="2023-0401"/> <issue tracker="cve" id="2023-0217"/> <issue tracker="cve" id="2022-4304"/> <issue tracker="cve" id="2022-4203"/> <packager>pmonrealgonzalez</packager> <rating>important</rating> <category>security</category> <summary>Security update for openssl-3</summary> <description>This update for openssl-3 fixes the following issues: Security fixes: - CVE-2023-0286: Fixed X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address (bsc#1207533). - CVE-2023-0401: Fixed NULL pointer dereference during PKCS7 data verification (bsc#1207541). - CVE-2023-0217: Fixed NULL pointer dereference validating DSA public key (bsc#1207540). - CVE-2023-0216: Fixed invalid pointer dereference in d2i_PKCS7 functions (bsc#1207539). - CVE-2023-0215: Fixed use-after-free following BIO_new_NDEF() (bsc#1207536). - CVE-2022-4450: Fixed double free after calling PEM_read_bio_ex() (bsc#1207538). - CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534). - CVE-2022-4203: Fixed read Buffer Overflow with X.509 Name Constraints (bsc#1207535). Non-security fixes: - Fix SHA, SHAKE, KECCAK ASM and EC ASM flag passing (bsc#1206222). - Enable zlib compression support (bsc#1195149). - Add crypto-policies dependency. </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor