• openssl-1.1.1k-9.el8_7 ()
  • 1.1.1k-14.el8_6
  • 2024-10-16 12:05:12
  • CVE CVE-2024-5535, CVSSv2 Score: 9.1
  • Description:

    Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality.