Search CVE reports


Toggle filters

11 – 20 of 467 results


CVE-2025-15469

Low priority

Some fixes available 1 of 4

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Needs evaluation
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-15468

Low priority

Some fixes available 1 of 6

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Needs evaluation
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-15467

Medium priority

Some fixes available 3 of 10

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Needs evaluation
edk2 Needs evaluation Not affected Not affected Not affected
Show less packages

CVE-2025-11187

Medium priority

Some fixes available 1 of 6

Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Needs evaluation
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-61985

Low priority

Some fixes available 4 of 11

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh Fixed Fixed Fixed Not affected
openssh-ssh1 Ignored Ignored Ignored Ignored
Show less packages

CVE-2025-61984

Low priority

Some fixes available 4 of 14

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command...

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh Fixed Fixed Fixed Vulnerable
openssh-ssh1 Ignored Ignored Ignored Ignored
Show less packages

CVE-2025-9232

Low priority

Some fixes available 4 of 7

Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Needs evaluation
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-9231

Medium priority

Some fixes available 2 of 5

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Needs evaluation
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-9230

Medium priority

Some fixes available 10 of 14

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial...

5 affected packages

openssl, openssl1.0, nodejs, edk2, openssl-fips

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed Fixed Fixed Fixed
openssl1.0 Not in release Not in release Fixed
nodejs Not affected Vulnerable Not affected Needs evaluation
edk2 Not affected Not affected Not affected Not affected
openssl-fips Fixed Needs evaluation Not in release Not in release
Show less packages

CVE-2023-53159

Medium priority
Fixed

The openssl crate before 0.10.55 for Rust allows an out-of-bounds read via an empty string to X509VerifyParamRef::set_host.

1 affected package

rust-openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
rust-openssl Not affected Fixed Fixed
Show less packages