{"schema_version":"1.7.2","id":"OESA-2024-1721","modified":"2024-06-14T11:08:16Z","published":"2024-06-14T11:08:16Z","upstream":["CVE-2024-4741"],"summary":"openssl security update","details":"The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL tookit and its related documentation.\r\n\r\nSecurity Fix(es):\r\n\r\nA use-after-free vulnerability was found in OpenSSL. Calling the OpenSSL API SSL_free_buffers function may cause memory to be accessed that was previously freed in some situations.(CVE-2024-4741)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"openssl","purl":"pkg:rpm/openEuler/openssl\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.12-6.oe2403"}]}],"ecosystem_specific":{"aarch64":["openssl-devel-3.0.12-6.oe2403.aarch64.rpm","openssl-libs-3.0.12-6.oe2403.aarch64.rpm","openssl-perl-3.0.12-6.oe2403.aarch64.rpm","openssl-debuginfo-3.0.12-6.oe2403.aarch64.rpm","openssl-debugsource-3.0.12-6.oe2403.aarch64.rpm","openssl-3.0.12-6.oe2403.aarch64.rpm"],"noarch":["openssl-help-3.0.12-6.oe2403.noarch.rpm"],"src":["openssl-3.0.12-6.oe2403.src.rpm"],"x86_64":["openssl-debuginfo-3.0.12-6.oe2403.x86_64.rpm","openssl-libs-3.0.12-6.oe2403.x86_64.rpm","openssl-debugsource-3.0.12-6.oe2403.x86_64.rpm","openssl-3.0.12-6.oe2403.x86_64.rpm","openssl-perl-3.0.12-6.oe2403.x86_64.rpm","openssl-devel-3.0.12-6.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4741"}],"database_specific":{"severity":"Critical"}}