-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update: openssl #1431
Labels
Comments
github-project-automation
bot
moved this to 📝 Needs Triage
in Flatcar tactical, release planning, and roadmap
Apr 22, 2024
dongsupark
moved this from 📝 Needs Triage
to 🪵Backlog
in Flatcar tactical, release planning, and roadmap
Apr 22, 2024
Added CVE-2024-4603 |
Added CVE-2024-4741, CVE-2024-5535. |
Added CVE-2024-6119 |
dongsupark
moved this from 🪵Backlog
to 🌱 Upcoming / Focus
in Flatcar tactical, release planning, and roadmap
Sep 5, 2024
Added CVE-2024-9143 |
dongsupark
moved this from 🌱 Upcoming / Focus
to 🪵Backlog
in Flatcar tactical, release planning, and roadmap
Oct 31, 2024
Set to |
dongsupark
moved this from 🪵Backlog
to 🌱 Upcoming / Focus
in Flatcar tactical, release planning, and roadmap
Nov 27, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Name: openssl
CVEs: CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2024-5535, CVE-2024-6119, CVE-2024-9143
CVSSs: n/a, 5.3, 7.5, 9.1, 7.5, 4.3 (https://www.cve.org)
Action Needed: CVE-2024-2511: update to >= 3.2.1-r2, CVE-2024-{4603,4741}: update to >= 3.2.2, CVE-2024-{5535, 6119}: update to >= 3.2.3, CVE-2024-9143: TBD
Summary:
otherName
subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.refmap.gentoo:
The text was updated successfully, but these errors were encountered: