SEVERITY: HIGH; handshakes with unauthenticated servers don't abort as expected (CVE-2024-12797) OpenSSL Security Advisory [11th February 2025] RFC7250 handshakes with unauthenticated servers don't abort as expected (CVE-2024-12797) https://openssl-library.org/news/secadv/20250211.txt The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this issue. OpenSSL 3.4, 3.3 and 3.2 are vulnerable to this issue. OpenSSL 3.4 users should upgrade to OpenSSL 3.4.1. OpenSSL 3.3 users should upgrade to OpenSSL 3.3.2. !!> OpenSSL 3.2 users should upgrade to OpenSSL 3.2.4. distro Name: Fedora Linux 41 (Server Edition) Version: 41 Codename: rpm -qa | grep -i ^openssl | sort openssl-3.2.2-11.fc41.x86_64 openssl-devel-3.2.2-11.fc41.x86_64 openssl-libs-3.2.2-11.fc41.x86_64 openssl-pkcs11-0.4.12-10.fc41.x86_64 Reproducible: Always
Implemented via rebase