• CVE-2024-2511

发布时间: 2024年5月10日

修改时间: 2024年5月10日

概要

Issue summary: Some non-default TLS server configurations can cause unboundedmemory growth when processing TLSv1.3 sessionsImpact summary: An attacker may exploit certain server configurations to triggerunbounded memory growth that would lead to a Denial of ServiceThis problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option isbeing used (but not if early_data support is also configured and the defaultanti-replay protection is in use). In this case, under certain conditions, thesession cache can get into an incorrect state and it will fail to flush properlyas it fills. The session cache will continue to grow in an unbounded manner. Amalicious client could deliberately create the scenario for this failure toforce a Denial of Service. It may also happen by accident in normal operation.This issue only affects TLS servers supporting TLSv1.3. It does not affect TLSclients.The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL1.0.2 is also not affected by this issue.

CVSS v3 指标

NVD openEuler
CVSS评分 5.9
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity None
Availability High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3494 openssl security update 2024年5月10日

影响产品

产品 状态
KY3.4-4A openssl Fixed
KY3.4-5A openssl Fixed
KY3.5.1 openssl Fixed
KY3.5.2 openssl Fixed