Source: openssl Version: 3.4.0-2 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for openssl. CVE-2024-12797[0]: | Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to | authenticate a server may fail to notice that the server was not | authenticated, because handshakes don't abort as expected when the | SSL_VERIFY_PEER verification mode is set. Impact summary: TLS and | DTLS connections using raw public keys may be vulnerable to man-in- | middle attacks when server authentication failure is not detected by | clients. RPKs are disabled by default in both TLS clients and TLS | servers. The issue only arises when TLS clients explicitly enable | RPK use by the server, and the server, likewise, enables sending of | an RPK instead of an X.509 certificate chain. The affected clients | are those that then rely on the handshake to fail when the server's | RPK fails to match one of the expected public keys, by setting the | verification mode to SSL_VERIFY_PEER. Clients that enable server- | side raw public keys can still find out that raw public key | verification failed by calling SSL_get_verify_result(), and those | that do, and take appropriate action, are not affected. This issue | was introduced in the initial implementation of RPK support in | OpenSSL 3.2. The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not | affected by this issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-12797 https://www.cve.org/CVERecord?id=CVE-2024-12797 [1] https://openssl-library.org/news/secadv/20250211.txt Regards, Salvatore