On 9/4/2024 9:27 AM, Wall, Stephen wrote:
Possible denial of service in X.509 name checks (CVE-2024-6119)
Is this something we need to concern ourselves with?
Since no one else is chiming in, I'll provide my feeble thoughts.  As I read 
it, it primarily affects outgoing TLS connections.  I.e., curl, wget, et al, 
and possibly (and more importantly IMO) apache/nginx proxying to another 
server.  Speculating here: this could affect high volume web services where 
security is enough of a concern that the operators have enabled certificate 
name checks.

As a commercial user of FreeBSD with security conscious customers, I would 
certainly like to see it fixed in a FreeBSD patch release, but in all honesty 
we could easily enough apply the openssl patches to our FreeBSD source tree 
ourselves.

It seems to be worked on.  The fix is already in the tree as of yesterday. https://cgit.freebsd.org/src/commit/?id=fbd465f263400d3bc6c1a5c30857a76738c64396

I imagine there will be a SA in the near future.

    ---Mike




Reply via email to