[CLSA-2023:1693419428] Fix CVE(s): CVE-2023-3817
Type:
security
Severity:
Moderate
Release date:
2023-08-30 18:17:13 UTC
Description:
* SECURITY UPDATE: Checking excessively long DH keys or parameters may be very slow. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. - debian/patches/CVE-2023-3817.patch: Add a prior check and process only a correct DH keys - CVE-2023-3817
Updated packages:
  • libssl-dev_1.0.2g-1ubuntu4.21+tuxcare.els8_amd64.deb
    sha:58c94bfb95ca853f23220f7838dda82a2e655f20
  • libssl-doc_1.0.2g-1ubuntu4.21+tuxcare.els8_all.deb
    sha:d3f75da26f33a30cad77a4fc7f8772bd10cc667d
  • libssl1.0.0_1.0.2g-1ubuntu4.21+tuxcare.els8_amd64.deb
    sha:ef53d3e5f3a41b41b947d054cab556592b6134c7
  • openssl_1.0.2g-1ubuntu4.21+tuxcare.els8_amd64.deb
    sha:22b74aabc50b4eb6dbe4bc94d99eead952570842
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.