You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 17, 2024. It is now read-only.
The current version of openssl package that comes along with this image contains the vulnerability CVE-2020-1967
Please find the description below:
## Description: Server or client applications that call the SSL_check_chain() function during or
after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling
of the "signature_algorithms_cert" TLS extension.
The crash occurs if an invalid or unrecognised signature algorithm is received from the peer.
This could be exploited by a malicious peer in a Denial of Service attack.
OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue.
This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
Please keep us posted when there is a fix for this.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hello,
The current version of openssl package that comes along with this image contains the vulnerability CVE-2020-1967
Please find the description below:
## Description: Server or client applications that call the SSL_check_chain() function during or
after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling
of the "signature_algorithms_cert" TLS extension.
The crash occurs if an invalid or unrecognised signature algorithm is received from the peer.
This could be exploited by a malicious peer in a Denial of Service attack.
OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue.
This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
Please keep us posted when there is a fix for this.
The text was updated successfully, but these errors were encountered: