Hi,

You are receiving an AlmaLinux Security update email because you subscribed to 
receive errata notifications from AlmaLinux.

AlmaLinux: 9
Type: Security
Severity: Low
Release date: 2024-05-07

Summary:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and 
Transport Layer Security (TLS) protocols, as well as a full-strength 
general-purpose cryptography library.

Security Fix(es):

* openssl: AES-SIV cipher implementation contains a bug that causes it to 
ignore empty associated data entries (CVE-2023-2975)
* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)
* OpenSSL: Excessive time spent checking DH q parameter value (CVE-2023-3817)
* openssl: Generating excessively long X9.42 DH keys or checking excessively 
long X9.42 DH keys or parameters may be very slow (CVE-2023-5678)
* openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC 
(CVE-2023-6129)
* openssl: Excessive time spent checking invalid RSA public keys (CVE-2023-6237)
* openssl: denial of service via null dereference (CVE-2024-0727)

For more details about the security issue(s), including the impact, a CVSS 
score, acknowledgments, and other related information, refer to the CVE page(s) 
listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release 
Notes linked from the References section.

Full details, updated packages, references, and other related information: 
https://errata.almalinux.org/9/ALSA-2024-2447.html

This message is automatically generated, please don’t reply. For further 
questions, please, contact us via the AlmaLinux community chat: 
https://chat.almalinux.org/.
Want to change your notification settings? Sign in and manage mailing lists on 
https://lists.almalinux.org.

Kind regards,
AlmaLinux Team

Reply via email to