摘要:
openssl security update
安全等级: Critical
公告ID: KylinSec-SA-2024-2951
发布日期: 2024年6月7日
关联CVE: CVE-2024-4741
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL tookit and its related documentation.
Security Fix(es):
A use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.(CVE-2024-4741)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-4741 | KY3.5.2 | openssl | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
openssl-help | noarch | 1.1.1m-36.ky3_5.kb1 |
openssl-libs | x86_64 | 1.1.1m-36.ky3_5.kb1 |
openssl-devel | x86_64 | 1.1.1m-36.ky3_5.kb1 |
openssl | x86_64 | 1.1.1m-36.ky3_5.kb1 |
openssl-perl | x86_64 | 1.1.1m-36.ky3_5.kb1 |
openssl | aarch64 | 1.1.1m-36.ky3_5.kb1 |
openssl-perl | aarch64 | 1.1.1m-36.ky3_5.kb1 |
openssl-libs | aarch64 | 1.1.1m-36.ky3_5.kb1 |
openssl-devel | aarch64 | 1.1.1m-36.ky3_5.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名