An update for openssl is now available for openEuler-22.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1698
Final
1.0
1.0
2024-06-07
Initial
2024-06-07
2024-06-07
openEuler SA Tool V1.0
2024-06-07
openssl security update
An update for openssl is now available for openEuler-22.03-LTS-SP1.
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL tookit and its related documentation.
Security Fix(es):
A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.(CVE-2024-4741)
An update for openssl is now available for openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Critical
openssl
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1698
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-4741
https://nvd.nist.gov/vuln/detail/CVE-2024-4741
openEuler-22.03-LTS-SP1
openssl-debuginfo-1.1.1m-36.oe2203sp1.aarch64.rpm
openssl-1.1.1m-36.oe2203sp1.aarch64.rpm
openssl-perl-1.1.1m-36.oe2203sp1.aarch64.rpm
openssl-libs-1.1.1m-36.oe2203sp1.aarch64.rpm
openssl-devel-1.1.1m-36.oe2203sp1.aarch64.rpm
openssl-debugsource-1.1.1m-36.oe2203sp1.aarch64.rpm
openssl-help-1.1.1m-36.oe2203sp1.noarch.rpm
openssl-1.1.1m-36.oe2203sp1.src.rpm
openssl-libs-1.1.1m-36.oe2203sp1.x86_64.rpm
openssl-devel-1.1.1m-36.oe2203sp1.x86_64.rpm
openssl-debuginfo-1.1.1m-36.oe2203sp1.x86_64.rpm
openssl-1.1.1m-36.oe2203sp1.x86_64.rpm
openssl-perl-1.1.1m-36.oe2203sp1.x86_64.rpm
openssl-debugsource-1.1.1m-36.oe2203sp1.x86_64.rpm
A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.
2024-06-07
CVE-2024-4741
openEuler-22.03-LTS-SP1
Critical
9.8
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
openssl security update
2024-06-07
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1698