Red Hat Openssl
Recent Red Hat Openssl Security Advisories
Advisory | Title | Published |
---|---|---|
RHSA-2024:0500 | (RHSA-2024:0500) Moderate: openssl security update | January 25, 2024 |
RHSA-2024:0208 | (RHSA-2024:0208) Low: openssl security update | January 11, 2024 |
RHSA-2024:0154 | (RHSA-2024:0154) Low: openssl security update | January 10, 2024 |
RHSA-2023:7877 | (RHSA-2023:7877) Low: openssl security update | December 19, 2023 |
RHSA-2023:3408 | (RHSA-2023:3408) Moderate: openssl security update | May 31, 2023 |
RHSA-2023:2523 | (RHSA-2023:2523) Low: openssl security and bug fix update | May 9, 2023 |
RHSA-2023:1441 | (RHSA-2023:1441) Important: openssl security update | March 23, 2023 |
RHSA-2023:1440 | (RHSA-2023:1440) Important: openssl security update | March 23, 2023 |
RHSA-2023:1439 | (RHSA-2023:1439) Important: openssl security update | March 23, 2023 |
RHSA-2023:1438 | (RHSA-2023:1438) Important: openssl security update | March 23, 2023 |
By the Year
In 2024 there have been 0 vulnerabilities in Red Hat Openssl . Openssl did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Openssl vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Openssl Security Vulnerabilities
The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2
CVE-2009-1387
- June 04, 2009
The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
NULL Pointer Dereference
ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet
CVE-2009-1386
- June 04, 2009
ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
NULL Pointer Dereference
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Canonical Ubuntu Linux or by Red Hat? Click the Watch button to subscribe.