vulnerability
CentOS Linux: CVE-2023-0464: Moderate: openssl security and bug fix update (CESA-2023:3722)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Mar 22, 2023 | Jun 22, 2023 | Jan 28, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Mar 22, 2023
Added
Jun 22, 2023
Modified
Jan 28, 2025
Description
A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
Solutions
centos-upgrade-opensslcentos-upgrade-openssl-debuginfocentos-upgrade-openssl-debugsourcecentos-upgrade-openssl-develcentos-upgrade-openssl-libscentos-upgrade-openssl-libs-debuginfocentos-upgrade-openssl-perl
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.