CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
61.1%
Issue Overview:
Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack
The package openssl098e is provided purely for binary compatibility with older Amazon Linux versions. It does not receive security updates. (CVE-2024-0727)
Affected Packages:
openssl11
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update openssl11 to update your system.
New Packages:
aarch64:
openssl11-1.1.1g-12.amzn2.0.20.aarch64
openssl11-libs-1.1.1g-12.amzn2.0.20.aarch64
openssl11-devel-1.1.1g-12.amzn2.0.20.aarch64
openssl11-static-1.1.1g-12.amzn2.0.20.aarch64
openssl11-debuginfo-1.1.1g-12.amzn2.0.20.aarch64
i686:
openssl11-1.1.1g-12.amzn2.0.20.i686
openssl11-libs-1.1.1g-12.amzn2.0.20.i686
openssl11-devel-1.1.1g-12.amzn2.0.20.i686
openssl11-static-1.1.1g-12.amzn2.0.20.i686
openssl11-debuginfo-1.1.1g-12.amzn2.0.20.i686
src:
openssl11-1.1.1g-12.amzn2.0.20.src
x86_64:
openssl11-1.1.1g-12.amzn2.0.20.x86_64
openssl11-libs-1.1.1g-12.amzn2.0.20.x86_64
openssl11-devel-1.1.1g-12.amzn2.0.20.x86_64
openssl11-static-1.1.1g-12.amzn2.0.20.x86_64
openssl11-debuginfo-1.1.1g-12.amzn2.0.20.x86_64
Red Hat: CVE-2024-0727
Mitre: CVE-2024-0727
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
61.1%