vulnerability

Rocky Linux: CVE-2023-0464: openssl (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
03/22/2023
Added
06/17/2024
Modified
01/30/2025

Description

A security vulnerability has been identified in all supported versions

of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.

Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.

Solution(s)

rocky-upgrade-opensslrocky-upgrade-openssl-debuginforocky-upgrade-openssl-debugsourcerocky-upgrade-openssl-develrocky-upgrade-openssl-fips-providerrocky-upgrade-openssl-fips-provider-debuginforocky-upgrade-openssl-fips-provider-debugsourcerocky-upgrade-openssl-libsrocky-upgrade-openssl-libs-debuginforocky-upgrade-openssl-perl
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.