{"id":"ALSA-2024:2447","summary":"Low: openssl and openssl-fips-provider security update","details":"OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries (CVE-2023-2975)\n* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)\n* OpenSSL: Excessive time spent checking DH q parameter value (CVE-2023-3817)\n* openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow (CVE-2023-5678)\n* openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129)\n* openssl: Excessive time spent checking invalid RSA public keys (CVE-2023-6237)\n* openssl: denial of service via null dereference (CVE-2024-0727)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-02-04T02:13:54.975229Z","published":"2024-04-30T00:00:00Z","related":["CVE-2023-2975","CVE-2023-3446","CVE-2023-3817","CVE-2023-5678","CVE-2023-6129","CVE-2023-6237","CVE-2024-0727"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2447"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2975"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3446"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3817"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5678"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6129"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6237"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0727"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2223016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2224962"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2227852"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2248616"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257571"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2258502"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2259944"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2024-2447.html"}],"affected":[{"package":{"name":"openssl","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/openssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.0.7-27.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2447.json"}},{"package":{"name":"openssl-devel","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/openssl-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.0.7-27.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2447.json"}},{"package":{"name":"openssl-libs","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/openssl-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.0.7-27.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2447.json"}},{"package":{"name":"openssl-perl","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/openssl-perl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.0.7-27.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2447.json"}}],"schema_version":"1.7.3"}