Bug 2181082 (CVE-2023-0464)
Summary: | CVE-2023-0464 openssl: Denial of service by excessive resource usage in verifying X509 policy constraints | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | acrosby, adudiak, agarcial, aoconnor, aprice, asegurap, bdettelb, berrange, bootloader-eng-team, caswilli, cllang, csutherl, dbelyavs, ddepaula, dffrench, dfreiber, dhalasz, dkuc, doconnor, drow, fjansen, gzaronik, hbraun, hkataria, ikanias, jary, jburrell, jclere, jdobes, jferlan, jforrest, jkoehler, jmitchel, jsamir, jtanner, kaycoth, kholdawa, kraxel, kshier, kyoshida, lcouzens, lphiri, luizcosta, masanari.iida, mdogra, micjohns, mmadzin, mpierce, mskarbek, mturk, ngough, nweather, omaciel, orabin, pbonzini, peholase, pjindal, plodge, psegedy, rblanco, rgodfrey, rh-spice-bugs, rogbas, rravi, security-response-team, stcannon, sthirugn, szappis, teagle, tfister, tohughes, tsasak, virt-maint, vkrizan, vkumar, vmugicag, vsroka, yguenane |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssl 3.1.1, openssl 3.0.9, openssl 1.1.1u | Doc Type: | If docs needed, set a value |
Doc Text: |
A security vulnerability has been identified in all supported OpenSSL versions related to verifying X.509 certificate chains that include policy constraints. This flaw allows attackers to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial of service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or calling the X509_VERIFY_PARAM_set1_policies()' function.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-06-22 02:43:22 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2181084, 2181085, 2181086, 2181087, 2181088, 2181089, 2181090, 2181093, 2181094, 2181095, 2181096, 2181097, 2181098, 2181099, 2181100, 2181101, 2181102, 2181103, 2181104, 2181105, 2186661, 2186662 | ||
Bug Blocks: | 2180963 |
Description
Sandipan Roy
2023-03-23 05:12:34 UTC
Created edk2 tracking bugs for this issue: Affects: fedora-all [bug 2181084] Created mingw-openssl tracking bugs for this issue: Affects: fedora-all [bug 2181085] Created openssl tracking bugs for this issue: Affects: fedora-all [bug 2181086] Created openssl1.1 tracking bugs for this issue: Affects: fedora-all [bug 2181087] Created shim tracking bugs for this issue: Affects: fedora-all [bug 2181088] Created shim-unsigned-aarch64 tracking bugs for this issue: Affects: fedora-all [bug 2181089] Created shim-unsigned-x64 tracking bugs for this issue: Affects: fedora-all [bug 2181090] This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:3722 https://access.redhat.com/errata/RHSA-2023:3722 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-0464 This issue has been addressed in the following products: Red Hat JBoss Web Server 5.7 on RHEL 7 Red Hat JBoss Web Server 5.7 on RHEL 8 Red Hat JBoss Web Server 5.7 on RHEL 9 Via RHSA-2023:7622 https://access.redhat.com/errata/RHSA-2023:7622 This issue has been addressed in the following products: Red Hat JBoss Web Server Via RHSA-2023:7623 https://access.redhat.com/errata/RHSA-2023:7623 This issue has been addressed in the following products: JBoss Core Services on RHEL 7 JBoss Core Services for RHEL 8 Via RHSA-2023:7625 https://access.redhat.com/errata/RHSA-2023:7625 This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2023:7626 https://access.redhat.com/errata/RHSA-2023:7626 |