Search for packages
Package details: pkg:conan/openssl@1.1.1t
purl pkg:conan/openssl@1.1.1t
Tags Ghost
Next non-vulnerable version 1.1.1w
Latest non-vulnerable version 3.2.4
Risk 4.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-2rtj-nbth-aaam
Aliases:
CVE-2023-3817
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
1.1.1v
Affected by 0 other vulnerabilities.
1.1.1w
Affected by 0 other vulnerabilities.
3.0.10
Affected by 0 other vulnerabilities.
3.0.12
Affected by 3 other vulnerabilities.
3.1.2
Affected by 4 other vulnerabilities.
3.1.3
Affected by 3 other vulnerabilities.
VCID-kn8m-m9v4-aaaa
Aliases:
CVE-2023-0466
Improper Certificate Validation The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.
1.1.1u
Affected by 1 other vulnerability.
1.1.1w
Affected by 0 other vulnerabilities.
3.0.9
Affected by 1 other vulnerability.
3.0.12
Affected by 3 other vulnerabilities.
3.1.1
Affected by 6 other vulnerabilities.
3.1.3
Affected by 3 other vulnerabilities.
VCID-mu8w-emsy-aaak
Aliases:
CVE-2023-0465
Improper Certificate Validation Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
1.1.1u
Affected by 1 other vulnerability.
1.1.1w
Affected by 0 other vulnerabilities.
3.0.9
Affected by 1 other vulnerability.
3.0.12
Affected by 3 other vulnerabilities.
3.1.1
Affected by 6 other vulnerabilities.
3.1.3
Affected by 3 other vulnerabilities.
VCID-tkv7-cnhy-aaas
Aliases:
CVE-2023-0464
Improper Certificate Validation A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
1.1.1u
Affected by 1 other vulnerability.
1.1.1w
Affected by 0 other vulnerabilities.
3.0.9
Affected by 1 other vulnerability.
3.0.11
Affected by 3 other vulnerabilities.
3.0.12
Affected by 3 other vulnerabilities.
3.1.1
Affected by 6 other vulnerabilities.
3.1.3
Affected by 3 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2024-09-17T22:47:54.399406+00:00 GitLab Importer Affected by VCID-2rtj-nbth-aaam https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/openssl/CVE-2023-3817.yml 34.0.1
2024-02-06T15:53:28.760807+00:00 GitLab Importer Affected by VCID-2rtj-nbth-aaam https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/openssl/CVE-2023-3817.yml 34.0.0rc2
2024-01-03T18:09:02.042841+00:00 GitLab Importer Fixing VCID-ur7f-5ey8-aaak https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/openssl/CVE-2022-4304.yml 34.0.0rc1
2024-01-03T18:09:01.639158+00:00 GitLab Importer Fixing VCID-ec3y-aejm-aaad https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/openssl/CVE-2022-4450.yml 34.0.0rc1
2024-01-03T18:09:00.646409+00:00 GitLab Importer Fixing VCID-5kqm-99x8-aaak https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/openssl/CVE-2023-3446.yml 34.0.0rc1
2024-01-03T18:09:00.037660+00:00 GitLab Importer Fixing VCID-9wtx-9sbn-aaam https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/openssl/CVE-2023-0286.yml 34.0.0rc1
2024-01-03T18:08:58.390791+00:00 GitLab Importer Affected by VCID-2rtj-nbth-aaam https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/openssl/CVE-2023-3817.yml 34.0.0rc1
2024-01-03T18:08:58.048735+00:00 GitLab Importer Fixing VCID-uua4-ygek-aaah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/openssl/CVE-2023-0215.yml 34.0.0rc1