CVE-2023-0464

Updated: 2024-11-24 04:55:42.442084

Description:

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU openssl 3.0.7 7.5 HIGH Already Fixed 2023-11-08 08:35:51
AlmaLinux 9.2 FIPS openssl 3.0.7 7.5 HIGH Already Fixed 2023-11-27 10:09:02
CentOS 6 ELS openssl 1.0.1e 7.5 HIGH Released CLSA-2023:1683236532 2023-05-17 14:09:43
CentOS 7 ELS openssl 1.0.2k 7.5 HIGH Released CLSA-2024:1720026957 2024-07-19 05:01:50
CentOS 8.4 ELS openssl 1.1.1g 7.5 HIGH Released CLSA-2023:1683234934 2023-05-04 20:55:56
CentOS 8.5 ELS openssl 1.1.1k 7.5 HIGH Released CLSA-2023:1683235231 2023-05-04 20:55:55
CloudLinux 6 ELS openssl 1.0.1e 7.5 HIGH Released CLSA-2023:1683235915 2023-05-17 14:09:44
Oracle Linux 6 ELS openssl 1.0.1e 7.5 HIGH Released CLSA-2023:1683235565 2023-05-04 20:55:57
Ubuntu 16.04 ELS openssl 1.0.2g-1 7.5 HIGH Released CLSA-2023:1683235759 2023-05-04 20:56:04
Ubuntu 18.04 ELS openssl 1.1.1-1 7.5 HIGH Already Fixed 2023-04-28 08:47:02