Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-4741

Опубликовано: 13 нояб. 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 7.5

Описание

Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arr...

РелизСтатусПримечание
devel

needed

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

needed

focal

ignored

end of standard support, was needed
jammy

needed

mantic

ignored

end of life, was needed
noble

needed

oracular

needed

plucky

needed

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

mantic

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

released

3.2.2-1ubuntu1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

1.1.1f-1ubuntu2.23
esm-infra/xenial

needs-triage

fips-preview/jammy

needed

fips-updates/bionic

needs-triage

fips-updates/focal

released

1.1.1f-1ubuntu2.fips.23
fips-updates/jammy

released

3.0.2-0ubuntu1.17+Fips1
fips-updates/xenial

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

1.0.2 not affected
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 39%
0.00167
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.6
redhat
около 1 года назад

Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrive...

CVSS3: 7.5
nvd
8 месяцев назад

Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid data, crashes or execution of arbitrary code. However, only applications that directly call the SSL_free_buffers function are affected by this issue. Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. The SSL_free_buffers function is used to free the internal OpenSSL buffer used when processing an incoming record from the network. The call is only expected to succeed if the buffer is not currently in use. However, two scenarios have been identified where the buffer is freed even when still in use. The first scenario occurs where a record header has been received from the network and processed by OpenSSL, but the full record body has not yet arrive

CVSS3: 7.5
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
8 месяцев назад

Issue summary: Calling the OpenSSL API function SSL_free_buffers may c ...

suse-cvrf
12 месяцев назад

Security update for openssl-1_1-livepatches

EPSS

Процентиль: 39%
0.00167
Низкий

7.5 High

CVSS3