Package | openssl |
---|---|
Version | 1.1.1n-0+deb10u7 (buster) |
Related CVEs | CVE-2023-5678 CVE-2024-0727 CVE-2024-2511 CVE-2024-4741 CVE-2024-5535 CVE-2024-9143 |
Multiple vulnerabilities were discovered in OpenSSL, the Secure Sockets Layer toolkit.
CVE-2023-5678
A denial of service could occur with excessively long X9.42 DH keys.
CVE-2024-0727
A denial of service could occur with a null field in a PKCS12 file.
CVE-2024-2511
A denial of service could occur when the SSL_OP_NO_TICKET
flag is set, with
TLSv1.3.
CVE-2024-4741
A use-after-free problem was found in the SSL_free_buffers
function.
CVE-2024-5535
Calling the OpenSSL API function SSL_select_next_proto
with an empty
supported client protocols buffer may cause a crash or memory contents to be
sent to the peer.
CVE-2024-9143
Use of the low-level GF(2^m)
elliptic curve APIs with untrusted explicit
values for the field polynomial can lead to out-of-bounds memory reads or
writes. This could lead to information disclosure or possibly remote code
execution.
For Debian 10 buster, these problems have been fixed in version 1.1.1n-0+deb10u7.
We recommend that you upgrade your openssl packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.