{"id":"AZL-25709","summary":"CVE-2023-0464 affecting package rust for versions less than 1.68.0-1","details":"A security vulnerability has been identified in all supported versions\n\nof OpenSSL related to the verification of X.509 certificate chains\nthat include policy constraints.  Attackers may be able to exploit this\nvulnerability by creating a malicious certificate chain that triggers\nexponential use of computational resources, leading to a denial-of-service\n(DoS) attack on affected systems.\n\nPolicy processing is disabled by default but can be enabled by passing\nthe `-policy' argument to the command line utilities or by calling the\n`X509_VERIFY_PARAM_set1_policies()' function.","modified":"2026-04-01T05:08:39.318875Z","published":"2023-03-22T17:15:13Z","upstream":["CVE-2023-0464"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0464"}],"affected":[{"package":{"name":"rust","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/rust"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.68.0-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-25709.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}