FERRAMENTAS LINUX: Critical OpenSSL-3 Security Update: Patch CVE-2024-6119 & 15 FIPS Fixes

sexta-feira, 9 de maio de 2025

Critical OpenSSL-3 Security Update: Patch CVE-2024-6119 & 15 FIPS Fixes

 

SUSE


Critical OpenSSL-3 update patches CVE-2024-6119 (CVSS 8.2) & 15 FIPS fixes for SUSE Linux Enterprise 15 SP7. Learn how to secure your systems against DoS attacks and maintain FIPS compliance with this essential patch.

Key Security Vulnerabilities Patched

SUSE has released a crucial security update for OpenSSL-3, addressing 16 vulnerabilities, including a high-risk denial-of-service (DoS) flaw (CVE-2024-6119) with a CVSS score of 8.2. This update is essential for enterprises relying on FIPS-compliant encryption and secure X.509 certificate validation.

Critical Fixes Included:

 CVE-2024-6119: DoS vulnerability in X.509 name checks

 FIPS Compliance Enhancements:

  • SHA-1 signature verification blocked in FIPS mode

  • RSA keygen PCT requirements enforced

  • NIST SP 800-56Brev2 & 800-56Arev3 compliance

  • Zero-initialization and DRBG reseeding fixes

  • Approved modulus sizes for RSA digital signatures

Why This Update Matters for Enterprises

OpenSSL is the backbone of secure communications, impacting TLS/SSL encryption, VPNs, and authentication systems. Unpatched systems risk:

  • Service disruptions from DoS attacks

  • Non-compliance with FIPS 140-2/3 standards

  • Increased attack surface for threat actors

How to Apply the Patch

Recommended Methods:

  1. YaST Online Update

  2. Zypper Patch Command:

    bash
    Copy
    Download
    zypper in -t patch SUSE-SLE-Module-Certifications-15-SP7-2025-1516=1

Affected Packages:

  • openssl-3-debugsource

  • libopenssl-3-fips-provider

FAQs

Q: Is this update mandatory for compliance?

A: Yes, especially for government, healthcare, and financial sectors requiring FIPS validation.

Q: What happens if I delay patching?

A: Systems remain vulnerable to certificate spoofing and service crashes.

Q: Are there performance impacts?

A: Minimal—optimizations like jitterentropy integration improve cryptographic randomness.

Nenhum comentário:

Postar um comentário