vulnerability

FreeBSD: VID-21f505f4-6a1c-11ef-b611-84a93843eb75 (CVE-2024-6119): OpenSSL -- Multiple vulnerabilities

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Sep 3, 2024
Added
Sep 3, 2024
Modified
Dec 10, 2025

Description

The OpenSSL project reports: Possible denial of service in X.509 name checks [Moderate severity] Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. SSL_select_next_proto buffer overread [Low severity] Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer.

Solutions

freebsd-upgrade-package-opensslfreebsd-upgrade-package-openssl31freebsd-upgrade-package-openssl32freebsd-upgrade-package-openssl33freebsd-upgrade-package-openssl-quictlsfreebsd-upgrade-package-openssl31-quictlsfreebsd-upgrade-base-14_1-release-p4freebsd-upgrade-base-14_0-release-p10
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.