openssl-3.0.7-28.el9_4.ML.1
エラータID: AXSA:2024-8829:06
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Possible denial of service in X.509 name checks (CVE-2024-6119)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-6119
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Update packages.
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
N/A
SRPMS
- openssl-3.0.7-28.el9_4.ML.1.src.rpm
MD5: 93c7da8e793ab408e7d96a95a7a827a8
SHA-256: c45800f3a7c9299070b1fb4e8f526cd492480ed441683a79f5ada4e347bbc6b1
Size: 14.81 MB
Asianux Server 9 for x86_64
- openssl-3.0.7-28.el9_4.ML.1.x86_64.rpm
MD5: f03ad27591d01ad600f2a89d583bda79
SHA-256: a400d18f727920bb5621dae10d5ff0d1a027aacdb5f5447222ba7c4f09cfd9cb
Size: 1.19 MB - openssl-devel-3.0.7-28.el9_4.ML.1.i686.rpm
MD5: 7104a3d47e4be586eec74143a81dee15
SHA-256: e49a5cd8d7bca8dbfc061956471105113211a991c8fbd008d32d7e41253e1024
Size: 3.14 MB - openssl-devel-3.0.7-28.el9_4.ML.1.x86_64.rpm
MD5: ca99fe8d815a04ca6b7b7442d43122d7
SHA-256: b9a312e79b3418aa0ae0881d40d46aae0cdd9350f6a2031ace2bccbe23cc9c60
Size: 3.14 MB - openssl-libs-3.0.7-28.el9_4.ML.1.i686.rpm
MD5: f35f08f30c03d700d3eac9ad2191f7c6
SHA-256: 44c6e4889cb67dfa5e816a56034fbb3fa092ce026cc74748ff8ce7435bcdcedc
Size: 2.14 MB - openssl-libs-3.0.7-28.el9_4.ML.1.x86_64.rpm
MD5: f7cba28f50b6650588637835989f372f
SHA-256: 4a2fc88b1576a894e5ccffca179c76d713f92947e71cc1bf855cbbee6a46ae26
Size: 2.14 MB - openssl-perl-3.0.7-28.el9_4.ML.1.x86_64.rpm
MD5: 155df4fb43c49f07781988f1f2e16068
SHA-256: 9328a480ce61cf84eafa15bbb90d8352f57e389170420636c5f6cad39daf0442
Size: 33.18 kB