diff options
author | Bernard Spil <brnrd@FreeBSD.org> | 2023-03-24 12:36:45 +0000 |
---|---|---|
committer | Bernard Spil <brnrd@FreeBSD.org> | 2023-03-24 12:36:45 +0000 |
commit | 728ba9ca8ef898510c0e486c660600c452fd69f1 (patch) | |
tree | c650d25fa63cb0c91fad4251cbb952b4d12c9f60 | |
parent | e217fd5b37d26da4dd8afc36e04bdfd55b4252fa (diff) | |
download | ports-728ba9ca8ef898510c0e486c660600c452fd69f1.tar.gz ports-728ba9ca8ef898510c0e486c660600c452fd69f1.zip |
security/vuxml: Adapt OpenSSL vuln for openssl-quictls
-rw-r--r-- | security/vuxml/vuln/2023.xml | 13 |
1 files changed, 7 insertions, 6 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index d0b89ac86a40..7437974a99ed 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -15,7 +15,7 @@ </package> <package> <name>openssl-quic</name> - <range><lt>3.1.0</lt></range> + <range><lt>3.0.8_1</lt></range> </package> </affects> <description> @@ -24,11 +24,11 @@ <blockquote cite="https://www.openssl.org/news/secadv/20230322.txt"> <p>Severity: Low</p> <p>A security vulnerability has been identified in all supported versions - of OpenSSL related to the verification of X.509 certificate chains - that include policy constraints. Attackers may be able to exploit this - vulnerability by creating a malicious certificate chain that triggers - exponential use of computational resources, leading to a denial-of-service - (DoS) attack on affected systems.</p> + of OpenSSL related to the verification of X.509 certificate chains + that include policy constraints. Attackers may be able to exploit this + vulnerability by creating a malicious certificate chain that triggers + exponential use of computational resources, leading to a denial-of-service + (DoS) attack on affected systems.</p> </blockquote> </body> </description> @@ -39,6 +39,7 @@ <dates> <discovery>2023-03-23</discovery> <entry>2023-03-24</entry> + <modified>2023-03-24</modified> </dates> </vuln> |