RLSA-2023:7877

Source
https://errata.rockylinux.org/RLSA-2023:7877
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:7877.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2023:7877
Upstream
Published
2025-12-03T09:02:10.105990Z
Modified
2025-12-03T11:33:56.524031Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Low: openssl security update
Details

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.

Security Fix(es):

  • openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)

  • OpenSSL: Excessive time spent checking DH q parameter value (CVE-2023-3817)

  • openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow (CVE-2023-5678)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / openssl

Package

Name
openssl
Purl
pkg:rpm/rocky-linux/openssl?distro=rocky-linux-8&epoch=1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.1.1k-12.el8_9
Database specific
{
    "yum_repository": "BaseOS"
}