CVE-2024-6119 Affecting libopenssl3 package, versions <3.0.8-150400.4.63.1


Severity

Recommended
high

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES154-LIBOPENSSL3-7887326
  • published4 Sept 2024
  • disclosed3 Sept 2024

Introduced: 3 Sep 2024

CVE-2024-6119  (opens in a new tab)

How to fix?

Upgrade SLES:15.4 libopenssl3 to version 3.0.8-150400.4.63.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libopenssl3 package and not the libopenssl3 package as distributed by SLES. See How to fix? for SLES:15.4 relevant fixed versions and status.

Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of service.

Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an otherName subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program.

Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

CVSS Scores

version 3.1