Search CVE reports
81 – 90 of 191 results
Some fixes available 10 of 16
The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data"...
4 affected packages
openssl, nodejs, edk2, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Fixed | Fixed |
nodejs | Not affected | Fixed | Not affected | Not affected |
edk2 | Not affected | Needs evaluation | Needs evaluation | Needs evaluation |
openssl1.0 | — | Not in release | Not in release | Not affected |
Some fixes available 3 of 4
A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an...
1 affected package
nodejs
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
nodejs | — | Fixed | Fixed | Fixed |
Some fixes available 10 of 19
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an...
4 affected packages
openssl, nodejs, edk2, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Fixed | Fixed |
nodejs | Not affected | Fixed | Not affected | Not affected |
edk2 | Not affected | Needs evaluation | Needs evaluation | Needs evaluation |
openssl1.0 | — | Not in release | Not in release | Ignored |
A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the...
4 affected packages
openssl, edk2, nodejs, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | — | Fixed | Not affected | Not affected |
edk2 | — | Not affected | Not affected | Not affected |
nodejs | — | Not affected | Not affected | Not affected |
openssl1.0 | — | Not in release | Not in release | Not affected |
Some fixes available 1 of 6
The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that "(appropriately) short exponents"...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Not affected | Fixed | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
Some fixes available 7 of 8
If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of...
4 affected packages
openssl, nodejs, edk2, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Not affected | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | — | Not in release | Not in release | Not affected |
Some fixes available 7 of 8
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a...
4 affected packages
openssl, nodejs, edk2, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Not affected | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | — | Not in release | Not in release | Not affected |
Some fixes available 7 of 8
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the...
4 affected packages
openssl, nodejs, edk2, openssl1.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Not affected | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | — | Not in release | Not in release | Not affected |
Some fixes available 1 of 2
The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.
1 affected package
nodejs
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
nodejs | — | Fixed | Not affected | Not affected |
A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check...
1 affected package
nodejs
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
nodejs | — | Not affected | Not affected | Not affected |