OpenSSL 3.6.2 Security Patch Fixes Multiple Vulnerabilities

OpenSSL 3.6.2 fixes eight security issues, including flaws affecting RSA KEM, AES-CFB-128, DANE client code, CMS, and delta CRL handling.

OpenSSL has released version 3.6.2 as a security patch update that fixes eight vulnerabilities, with the project rating the most severe issue as Moderate. The update addresses flaws in RSA KEM handling, AES-CFB-128 on x86-64 systems with AVX-512, DANE client code, CMS processing, delta CRL handling, and hexadecimal conversion.

The vulnerabilities fixed in OpenSSL 3.6.2 are:

Among the issues fixed in this release are incorrect failure handling in RSA KEM RSASVE encapsulation, loss of key agreement group tuple structure when the DEFAULT keyword is used in server-side configuration, and an out-of-bounds read in AES-CFB-128 on x86-64 CPUs with AVX-512 support.

OpenSSL 3.6.2 also resolves a potential use-after-free in DANE client code, a heap buffer overflow in hexadecimal conversion, and several NULL pointer dereference bugs affecting delta CRL processing and CMS recipient info handling.

For more details, see the changelog.

Bobby Borisov

Bobby Borisov

Bobby, an editor-in-chief at Linuxiac, is a Linux professional with over 20 years of experience. With a strong focus on Linux and open-source software, he has worked as a Senior Linux System Administrator, Software Developer, and DevOps Engineer for small and large multinational companies.

Leave a Reply

Your email address will not be published. Required fields are marked *