Openssl Red Hat Openssl

Do you want an email whenever new security vulnerabilities are reported in Red Hat Openssl?

Recent Red Hat Openssl Security Advisories

Advisory Title Published
RHSA-2024:0500 (RHSA-2024:0500) Moderate: openssl security update January 25, 2024
RHSA-2024:0208 (RHSA-2024:0208) Low: openssl security update January 11, 2024
RHSA-2024:0154 (RHSA-2024:0154) Low: openssl security update January 10, 2024
RHSA-2023:7877 (RHSA-2023:7877) Low: openssl security update December 19, 2023
RHSA-2023:3408 (RHSA-2023:3408) Moderate: openssl security update May 31, 2023
RHSA-2023:2523 (RHSA-2023:2523) Low: openssl security and bug fix update May 9, 2023
RHSA-2023:1441 (RHSA-2023:1441) Important: openssl security update March 23, 2023
RHSA-2023:1440 (RHSA-2023:1440) Important: openssl security update March 23, 2023
RHSA-2023:1439 (RHSA-2023:1439) Important: openssl security update March 23, 2023
RHSA-2023:1438 (RHSA-2023:1438) Important: openssl security update March 23, 2023

By the Year

In 2024 there have been 0 vulnerabilities in Red Hat Openssl . Openssl did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Openssl vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Openssl Security Vulnerabilities

The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2

CVE-2009-1387 - June 04, 2009

The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."

NULL Pointer Dereference

ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet

CVE-2009-1386 - June 04, 2009

ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.

NULL Pointer Dereference

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Canonical Ubuntu Linux or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe