• 公告ID (KylinSec-SA-2024-4870)

摘要:

openssl security update

安全等级: High

公告ID: KylinSec-SA-2024-4870

发布日期: 2025年2月17日

关联CVE: CVE-2024-6119  

  • 详细介绍

1. 漏洞描述

   

The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL tookit and its related documentation.

Security Fix(es):

Issue summary: Applications performing certificate name checks (e.g., TLS
clients checking server certificates) may attempt to read an invalid memory
address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of
service.

Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.

Note that basic certificate chain validation (signatures, dates...) is not
affected, the denial of service can occur only when the application also
specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they
generally don't perform a name check against a reference identifier (expected
identity), but rather extract the presented identity after checking the
certificate chain. So TLS servers are generally not affected and the severity
of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.(CVE-2024-6119)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-6119 V6 edk2 Fixed

3. 影响组件

    openssl

4. 修复版本

   

V6

软件名称 架构 版本号
openssl-help noarch 3.0.12-15.ks6
openssl x86_64 3.0.12-15.ks6
openssl-devel x86_64 3.0.12-15.ks6
openssl-libs x86_64 3.0.12-15.ks6
openssl-perl x86_64 3.0.12-15.ks6
openssl aarch64 3.0.12-15.ks6
openssl-devel aarch64 3.0.12-15.ks6
openssl-libs aarch64 3.0.12-15.ks6
openssl-perl aarch64 3.0.12-15.ks6

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

V6:

x86_64:

     openssl-help   

     openssl   

     openssl-devel   

     openssl-libs   

     openssl-perl   

aarch64:

     openssl-help   

     openssl   

     openssl-devel   

     openssl-libs   

     openssl-perl   

上一篇:KylinSec-SA-2024-4863 下一篇:KylinSec-SA-2024-4871