Описание
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca...
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | needed | |
esm-apps/bionic | needs-triage | |
esm-apps/xenial | needs-triage | |
esm-infra/focal | needed | |
focal | ignored | end of standard support, was needed |
jammy | needed | |
lunar | ignored | end of life, was needs-triage |
mantic | ignored | end of life, was needed |
noble | needed |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | not-affected | uses system openssl1.0 |
devel | not-affected | uses system openssl |
esm-apps/bionic | not-affected | uses system openssl1.0 |
esm-apps/focal | not-affected | uses system openssl |
esm-apps/jammy | needed | |
esm-apps/noble | not-affected | uses system openssl |
esm-apps/xenial | not-affected | uses system openssl |
esm-infra-legacy/trusty | not-affected | uses system openssl |
focal | not-affected | uses system openssl |
jammy | needed |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 3.0.10-1ubuntu2 |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/bionic | released | 1.1.1-1ubuntu2.1~18.04.23+esm3 |
esm-infra/focal | not-affected | 1.1.1f-1ubuntu2.20 |
esm-infra/xenial | released | 1.0.2g-1ubuntu4.20+esm10 |
fips-preview/jammy | released | 3.0.2-0ubuntu1.12+Fips1 |
fips-updates/bionic | released | 1.1.1-1ubuntu2.fips.2.1~18.04.23.3 |
fips-updates/focal | released | 1.1.1f-1ubuntu2.fips.20 |
fips-updates/jammy | released | 3.0.2-0ubuntu1.12+Fips1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | DNE | |
esm-infra/bionic | released | 1.0.2n-1ubuntu5.13+esm1 |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
lunar | DNE | |
mantic | DNE | |
noble | DNE | |
oracular | DNE |
Показывать по
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca...
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application c
Issue summary: Checking excessively long DH keys or parameters may be ...
EPSS
5.3 Medium
CVSS3