Search for packages
purl | pkg:alpm/archlinux/openssl@1.1.0.a-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-j6bv-cdqn-aaan
Aliases: CVE-2016-7053 VC-OPENSSL-20161110-CVE-2016-7053 |
Applications parsing invalid CMS structures can crash with a NULL pointer dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0 which can result in a NULL value being passed to the structure callback if an attempt is made to free certain invalid encodings. Only CHOICE structures using a callback which do not handle NULL value are affected. |
Affected by 0 other vulnerabilities. |
VCID-pqvw-s72q-aaam
Aliases: CVE-2016-7054 VC-OPENSSL-20161110-CVE-2016-7054 |
TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:46:15.853245+00:00 | Arch Linux Importer | Affected by | VCID-j6bv-cdqn-aaan | https://security.archlinux.org/AVG-143 | 36.0.0 |
2025-03-28T07:46:15.834701+00:00 | Arch Linux Importer | Affected by | VCID-pqvw-s72q-aaam | https://security.archlinux.org/AVG-143 | 36.0.0 |
2024-09-18T02:01:26.914733+00:00 | Arch Linux Importer | Affected by | VCID-j6bv-cdqn-aaan | https://security.archlinux.org/AVG-143 | 34.0.1 |
2024-09-18T02:01:26.888804+00:00 | Arch Linux Importer | Affected by | VCID-pqvw-s72q-aaam | https://security.archlinux.org/AVG-143 | 34.0.1 |
2024-01-03T22:27:36.635226+00:00 | Arch Linux Importer | Affected by | VCID-j6bv-cdqn-aaan | https://security.archlinux.org/AVG-143 | 34.0.0rc1 |
2024-01-03T22:27:36.615960+00:00 | Arch Linux Importer | Affected by | VCID-pqvw-s72q-aaam | https://security.archlinux.org/AVG-143 | 34.0.0rc1 |