openssl-3.0.7-28.el9_4.ML.1
エラータID: AXSA:2024-8829:06
リリース日:
2024/09/25 Wednesday - 18:38
題名:
openssl-3.0.7-28.el9_4.ML.1
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- OpenSSL には、想定する DNS 名、電子メールアドレス、
もしくは IP アドレスを指定して X.509 証明書の名称チェック
処理を実行した際、無効なメモリ領域を読み取ってしまう
問題があるため、リモートの攻撃者により、細工された X.509
証明書の処理を介して、サービス拒否攻撃を可能とする脆弱性
が存在します。(CVE-2024-6119)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-6119
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
追加情報:
N/A
ダウンロード:
SRPMS
- openssl-3.0.7-28.el9_4.ML.1.src.rpm
MD5: 93c7da8e793ab408e7d96a95a7a827a8
SHA-256: c45800f3a7c9299070b1fb4e8f526cd492480ed441683a79f5ada4e347bbc6b1
Size: 14.81 MB
Asianux Server 9 for x86_64
- openssl-3.0.7-28.el9_4.ML.1.x86_64.rpm
MD5: f03ad27591d01ad600f2a89d583bda79
SHA-256: a400d18f727920bb5621dae10d5ff0d1a027aacdb5f5447222ba7c4f09cfd9cb
Size: 1.19 MB - openssl-devel-3.0.7-28.el9_4.ML.1.i686.rpm
MD5: 7104a3d47e4be586eec74143a81dee15
SHA-256: e49a5cd8d7bca8dbfc061956471105113211a991c8fbd008d32d7e41253e1024
Size: 3.14 MB - openssl-devel-3.0.7-28.el9_4.ML.1.x86_64.rpm
MD5: ca99fe8d815a04ca6b7b7442d43122d7
SHA-256: b9a312e79b3418aa0ae0881d40d46aae0cdd9350f6a2031ace2bccbe23cc9c60
Size: 3.14 MB - openssl-libs-3.0.7-28.el9_4.ML.1.i686.rpm
MD5: f35f08f30c03d700d3eac9ad2191f7c6
SHA-256: 44c6e4889cb67dfa5e816a56034fbb3fa092ce026cc74748ff8ce7435bcdcedc
Size: 2.14 MB - openssl-libs-3.0.7-28.el9_4.ML.1.x86_64.rpm
MD5: f7cba28f50b6650588637835989f372f
SHA-256: 4a2fc88b1576a894e5ccffca179c76d713f92947e71cc1bf855cbbee6a46ae26
Size: 2.14 MB - openssl-perl-3.0.7-28.el9_4.ML.1.x86_64.rpm
MD5: 155df4fb43c49f07781988f1f2e16068
SHA-256: 9328a480ce61cf84eafa15bbb90d8352f57e389170420636c5f6cad39daf0442
Size: 33.18 kB