openssl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openssl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2:1.0.1e-59.0.4.ksplice1.el6_10
  • H
ELSA-2019-4747

<2:1.0.1e-58.0.1.ksplice1.el6_10
  • H
ELSA-2018-4254

<2:1.0.1e-57.0.6.ksplice1.el6
  • H
ELSA-2018-4229

<2:1.0.1e-57.0.5.ksplice1.el6
  • M
ELSA-2017-3519

<2:1.0.1e-48.ksplice1.el6_8.4
  • H
ELSA-2016-3523

<2:1.0.1e-42.ksplice1.el6_7.4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2:1.0.1e-59.0.3.ksplice1.el6_10
  • H
NULL Pointer Dereference

<0:1.0.1e-59.0.1.el6_10
  • M
Information Exposure

<0:1.0.1e-58.0.1.el6_10
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1.0.1e-57.0.6.el6
  • H
Key Management Errors

<0:1.0.1e-57.0.6.el6
  • H
Uncontrolled Recursion

<0:1.0.1e-57.0.5.el6
  • H
Out-of-Bounds

<0:1.0.1e-57.0.3.el6
  • M
Out-of-bounds Read

<0:1.0.1e-48.el6_8.4
  • M
Resource Exhaustion

<0:1.0.1e-48.el6_8.4
  • H
Integer Overflow or Wraparound

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Out-of-bounds Read

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Resource Management Errors

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Improper Input Validation

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Memory Leak

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Out-of-bounds Write

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Information Exposure

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Numeric Errors

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Out-of-bounds Read

<2:1.0.1e-48.ksplice1.el6_8.3
  • H
Out-of-Bounds

<2:1.0.1e-48.ksplice1.el6_8.1
  • H
Resource Management Errors

<2:1.0.1e-48.ksplice1.el6_8.1
  • H
Numeric Errors

<2:1.0.1e-48.ksplice1.el6_8.1
  • H
Integer Overflow or Wraparound

<2:1.0.1e-48.ksplice1.el6_8.1
  • H
Out-of-Bounds

<2:1.0.1e-48.ksplice1.el6_8.1
  • H
Out-of-Bounds

<2:1.0.1e-48.ksplice1.el6_8.1
  • H
Information Exposure

<2:1.0.1e-48.ksplice1.el6_8.1
  • H
Information Exposure

<0:1.0.1e-42.el6_7.4
  • H
CVE-2016-0705

<0:1.0.1e-42.el6_7.4
  • H
CVE-2016-0797

<0:1.0.1e-42.el6_7.4
  • H
Information Exposure

<0:1.0.1e-42.el6_7.4
  • H
Information Exposure

<0:1.0.1e-42.el6_7.4
  • M
Improper Data Handling

<0:1.0.1e-42.el6_7.2
  • M
Race Condition

<0:1.0.1e-42.el6_7.1
  • M
NULL Pointer Dereference

<0:1.0.1e-42.el6_7.1
  • M
Information Exposure

<0:1.0.1e-42.el6_7.1
  • M
Resource Management Errors

<0:1.0.1e-30.el6_6.11
  • M
Numeric Errors

<0:1.0.1e-30.el6_6.11
  • M
Out-of-Bounds

<0:1.0.1e-30.el6_6.11
  • M
Out-of-Bounds

<0:1.0.1e-30.el6_6.11
  • M
CVE-2015-1790

<0:1.0.1e-30.el6_6.11
  • M
Race Condition

<0:1.0.1e-30.el6_6.11
  • M
Cryptographic Issues

<0:1.0.1e-30.el6_6.9
  • M
Improper Input Validation

<0:1.0.1e-30.el6_6.7
  • M
CVE-2015-0288

<0:1.0.1e-30.el6_6.7
  • M
Code

<0:1.0.1e-30.el6_6.7
  • M
Code

<0:1.0.1e-30.el6_6.7
  • M
CVE-2015-0209

<0:1.0.1e-30.el6_6.7
  • M
CVE-2015-0289

<0:1.0.1e-30.el6_6.7
  • M
Out-of-Bounds

<0:1.0.1e-30.el6_6.7
  • M
Cryptographic Issues

<0:1.0.1e-30.el6_6.5
  • M
CVE-2014-3571

<0:1.0.1e-30.el6_6.5
  • M
Cryptographic Issues

<0:1.0.1e-30.el6_6.5
  • M
Cryptographic Issues

<0:1.0.1e-30.el6_6.5
  • M
Cryptographic Issues

<0:1.0.1e-30.el6_6.5
  • M
Out-of-Bounds

<0:1.0.1e-30.el6_6.5
  • M
Cryptographic Issues

<0:1.0.1e-30.el6_6.5
  • H
Improper Input Validation

<0:1.0.1e-30.el6_6.2
  • H
Improper Input Validation

<0:1.0.1e-30.el6_6.2
  • M
Race Condition

<0:1.0.1e-16.el6_5.15
  • M
CVE-2014-3511

<0:1.0.1e-16.el6_5.15
  • M
Resource Management Errors

<0:1.0.1e-16.el6_5.15
  • M
CVE-2014-3510

<0:1.0.1e-16.el6_5.15
  • M
CVE-2014-3505

<0:1.0.1e-16.el6_5.15
  • M
Resource Management Errors

<0:1.0.1e-16.el6_5.15
  • M
Information Exposure

<0:1.0.1e-16.el6_5.15
  • H
NULL Pointer Dereference

<0:1.0.1e-16.el6_5.14
  • H
CVE-2014-0221

<0:1.0.1e-16.el6_5.14
  • H
Inadequate Encryption Strength

<0:1.0.1e-16.el6_5.14
  • H
Race Condition

<0:1.0.1e-16.el6_5.14
  • H
Buffer Overflow

<0:1.0.1e-16.el6_5.14
  • H
NULL Pointer Dereference

<0:1.0.1e-16.el6_5.14
  • H
Out-of-bounds Read

<0:1.0.1e-16.el6_5.7
  • H
Improper Input Validation

<0:1.0.1e-16.el6_5.4
  • H
Cryptographic Issues

<0:1.0.1e-16.el6_5.4
  • H
Cryptographic Issues

<0:1.0.1e-16.el6_5.4
  • M
Cryptographic Issues

<0:1.0.0-27.el6_4.2
  • M
Cryptographic Issues

<0:1.0.0-27.el6_4.2
  • M
Cryptographic Issues

<0:1.0.0-27.el6_4.2
  • M
Numeric Errors

<0:1.0.0-20.el6_2.5
  • H
Out-of-Bounds

<0:1.0.0-20.el6_2.4
  • M
Resource Management Errors

<0:1.0.0-20.el6_2.3
  • M
Cryptographic Issues

<0:1.0.0-20.el6_2.3
  • M
Cryptographic Issues

<0:1.0.0-20.el6_2.1
  • M
Resource Management Errors

<0:1.0.0-20.el6_2.1
  • M
Resource Management Errors

<0:1.0.0-20.el6_2.1
  • M
Cryptographic Issues

<0:1.0.0-20.el6_2.1
  • M
Access Restriction Bypass

<0:1.0.0-10.el6_1.5
  • M
Resource Management Errors

<0:1.0.0-10.el6
  • M
CVE-2010-4180

<0:1.0.0-4.el6_0.2
  • M
Race Condition

<0:1.0.0-4.el6_0.2