发布时间: 2023年4月11日
修改时间: 2024年10月31日
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies() function.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Network | Network |
CVSS评分 | 7.5 | 7.5 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1995 | openssl security update | 2023年4月11日 |
KylinSec-SA-2024-1493 | nodejs security update | 2024年2月8日 |
KylinSec-SA-2024-1566 | shim security update | 2024年2月23日 |
KylinSec-SA-2024-1572 | nodejs security update | 2024年2月8日 |
KylinSec-SA-2024-4768 | edk2 security update | 2025年2月17日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | openssl | Fixed |
KY3.5.2 | openssl | Fixed |
KY3.4-5A | openssl | Fixed |
KY3.5.1 | openssl | Fixed |