Количество 22
Количество 22

BDU:2023-02108
Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2023-0464
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVE-2023-0464
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVE-2023-0464
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVE-2023-0464
CVE-2023-0464
A security vulnerability has been identified in all supported versions ...

SUSE-SU-2023:1764-1
Security update for openssl

SUSE-SU-2023:1754-1
Security update for openssl1

SUSE-SU-2023:1748-1
Security update for openssl-1_1

SUSE-SU-2023:1747-1
Security update for openssl-1_1

SUSE-SU-2023:1746-1
Security update for openssl-3

SUSE-SU-2023:1745-1
Security update for openssl-1_1

SUSE-SU-2023:1738-1
Security update for openssl

SUSE-SU-2023:1737-1
Security update for compat-openssl098

SUSE-SU-2023:1704-1
Security update for openssl-1_0_0

SUSE-SU-2023:1703-1
Security update for openssl-1_0_0

ROS-20230407-03
Уязвимость OpenSSL
GHSA-w2w6-xp88-5cvw
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

SUSE-SU-2023:1790-1
Security update for openssl-1_1
ELSA-2023-3722
ELSA-2023-3722: openssl security and bug fix update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-02108 Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 2 лет назад |
![]() | CVE-2023-0464 A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. | CVSS3: 7.5 | 1% Низкий | около 2 лет назад |
![]() | CVE-2023-0464 A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. | CVSS3: 5.9 | 1% Низкий | около 2 лет назад |
![]() | CVE-2023-0464 A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. | CVSS3: 7.5 | 1% Низкий | около 2 лет назад |
![]() | CVSS3: 7.5 | 1% Низкий | около 2 лет назад | |
CVE-2023-0464 A security vulnerability has been identified in all supported versions ... | CVSS3: 7.5 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1764-1 Security update for openssl | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1754-1 Security update for openssl1 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1748-1 Security update for openssl-1_1 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1747-1 Security update for openssl-1_1 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1746-1 Security update for openssl-3 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1745-1 Security update for openssl-1_1 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1738-1 Security update for openssl | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1737-1 Security update for compat-openssl098 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1704-1 Security update for openssl-1_0_0 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1703-1 Security update for openssl-1_0_0 | 1% Низкий | около 2 лет назад | |
![]() | ROS-20230407-03 Уязвимость OpenSSL | CVSS3: 7.5 | 1% Низкий | около 2 лет назад |
GHSA-w2w6-xp88-5cvw A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. | CVSS3: 7.5 | 1% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:1790-1 Security update for openssl-1_1 | около 2 лет назад | ||
ELSA-2023-3722 ELSA-2023-3722: openssl security and bug fix update (MODERATE) | почти 2 года назад |
Уязвимостей на страницу