-------------------------------------------------------------------------
Debian LTS Advisory DLA-3942-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                         Sean Whitton
October 31, 2024                              https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : openssl
Version        : 1.1.1n-0+deb11u6
CVE ID         : CVE-2023-5678 CVE-2024-0727 CVE-2024-2511 CVE-2024-4741
                 CVE-2024-5535 CVE-2024-9143
Debian Bug     : 1055473 1061582 1068658 1072113 1074487 1085378

Multiple vulnerabilities were discovered in OpenSSL, the Secure Sockets
Layer toolkit.

CVE-2023-5678

    A denial of service could occur with excessively long X9.42 DH keys.

CVE-2024-0727

    A denial of service could occur with a null field in a PKCS12 file.

CVE-2024-2511

    A denial of service could occur when the SSL_OP_NO_TICKET flag is
    set, with TLSv1.3.

CVE-2024-4741

    A use-after-free problem was found in the SSL_free_buffers function.

CVE-2024-5535

    Calling the OpenSSL API function SSL_select_next_proto with an empty
    supported client protocols buffer may cause a crash or memory
    contents to be sent to the peer.

CVE-2024-9143

    Use of the low-level GF(2^m) elliptic curve APIs with untrusted
    explicit values for the field polynomial can lead to out-of-bounds
    memory reads or writes.  This could lead to information disclosure
    or possibly remote code execution.

For Debian 11 bullseye, these problems have been fixed in version
1.1.1n-0+deb11u6.

We recommend that you upgrade your openssl packages.

For the detailed security status of openssl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3942-1: openssl Security Advisory Updates

October 31, 2024
Multiple vulnerabilities were discovered in OpenSSL, the Secure Sockets Layer toolkit

Summary

CVE-2023-5678

A denial of service could occur with excessively long X9.42 DH keys.

CVE-2024-0727

A denial of service could occur with a null field in a PKCS12 file.

CVE-2024-2511

A denial of service could occur when the SSL_OP_NO_TICKET flag is
set, with TLSv1.3.

CVE-2024-4741

A use-after-free problem was found in the SSL_free_buffers function.

CVE-2024-5535

Calling the OpenSSL API function SSL_select_next_proto with an empty
supported client protocols buffer may cause a crash or memory
contents to be sent to the peer.

CVE-2024-9143

Use of the low-level GF(2^m) elliptic curve APIs with untrusted
explicit values for the field polynomial can lead to out-of-bounds
memory reads or writes. This could lead to information disclosure
or possibly remote code execution.

For Debian 11 bullseye, these problems have been fixed in version
1.1.1n-0+deb11u6.

We recommend that you upgrade your openssl packages.

For the detailed security status of openssl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : openssl
Version : 1.1.1n-0+deb11u6
CVE ID : CVE-2023-5678 CVE-2024-0727 CVE-2024-2511 CVE-2024-4741
Debian Bug : 1055473 1061582 1068658 1072113 1074487 1085378

Related News