[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255479

 
 

909

 
 

198938

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2023:0312-1 -- SLES openssl-3, libopenssl-3-devel, libopenssl3

ID: oval:org.secpod.oval:def:89048223Date: (C)2023-02-10   (M)2024-02-19
Class: PATCHFamily: unix




This update for openssl-3 fixes the following issues: Security fixes: - CVE-2023-0286: Fixed X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address . - CVE-2023-0401: Fixed NULL pointer dereference during PKCS7 data verification . - CVE-2023-0217: Fixed NULL pointer dereference validating DSA public key . - CVE-2023-0216: Fixed invalid pointer dereference in d2i_PKCS7 functions . - CVE-2023-0215: Fixed use-after-free following BIO_new_NDEF . - CVE-2022-4450: Fixed double free after calling PEM_read_bio_ex . - CVE-2022-4304: Fixed timing Oracle in RSA Decryption . - CVE-2022-4203: Fixed read Buffer Overflow with X.509 Name Constraints . Non-security fixes: - Fix SHA, SHAKE, KECCAK ASM and EC ASM flag passing . - Enable zlib compression support . - Add crypto-policies dependency.

Platform:
SUSE Linux Enterprise Desktop 15 SP4
SUSE Linux Enterprise Server 15 SP4
Product:
openssl-3
libopenssl-3-devel
libopenssl3
Reference:
SUSE-SU-2023:0312-1
CVE-2022-4203
CVE-2022-4304
CVE-2022-4450
CVE-2023-0215
CVE-2023-0216
CVE-2023-0217
CVE-2023-0286
CVE-2023-0401
CVE    8
CVE-2023-0216
CVE-2023-0217
CVE-2023-0401
CVE-2022-4203
...

© SecPod Technologies