Bug 2274020 (CVE-2024-2511)
Summary: | CVE-2024-2511 openssl: Unbounded memory growth with session handling in TLSv1.3 | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marco Benatto <mbenatto> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | dareynol |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | OpenSSL 3.2.2, OpenSSL 3.1.6, OpenSSL 3.0.14, OpenSSL 1.1.1y | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in OpenSSL. A malicious client can trigger an uncontrolled memory consumption, resulting in a Denial of Service. This issue occurs due to OpenSSL's TLSv1.3 session cache going into an incorrect state, leading to it failing to flush properly as it fills. OpenSSL must be configured with the non-default SSL_OP_NO_TICKET option enabled to be vulnerable. This issue only affects TLSv1.3 servers, while TLS clients are not affected.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2274021, 2274022, 2274023, 2274024 | ||
Bug Blocks: | 2274025 |
Description
Marco Benatto
2024-04-08 15:28:23 UTC
Created edk2 tracking bugs for this issue: Affects: fedora-all [bug 2274024] Created openssl tracking bugs for this issue: Affects: fedora-all [bug 2274023] Created openssl11 tracking bugs for this issue: Affects: epel-all [bug 2274022] Created openssl3 tracking bugs for this issue: Affects: epel-all [bug 2274021] Upstream commit for this issue: https://github.com/openssl/openssl/commit/7984fa683e9dfac0cad50ef2a9d5a13330222044 https://github.com/openssl/openssl/commit/21df7f04f6c4a560b4de56d10e1e58958c7e566d https://github.com/openssl/openssl/commit/4a3e8f08306c64366318e26162ae0a0eb7b1a006 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9333 https://access.redhat.com/errata/RHSA-2024:9333 |