A security vulnerability has been identified in all supported versions of
OpenSSL related to the verification of X.509 certificate chains that
include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems. Policy processing is disabled by default
but can be enabled by passing the -policy' argument to the command line utilities or by calling the
X509_VERIFY_PARAM_set1_policies()’ function.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | edk2 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | edk2 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | edk2 | < any | UNKNOWN |
ubuntu | 23.10 | noarch | edk2 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | edk2 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | nodejs | < any | UNKNOWN |
ubuntu | 22.04 | noarch | nodejs | < any | UNKNOWN |
ubuntu | 16.04 | noarch | nodejs | < any | UNKNOWN |
ubuntu | 18.04 | noarch | openssl | < 1.1.1-1ubuntu2.1~18.04.22 | UNKNOWN |
ubuntu | 20.04 | noarch | openssl | < 1.1.1f-1ubuntu2.18 | UNKNOWN |