{"id":"AZL-37680","summary":"CVE-2023-0464 affecting package hvloader for versions less than 1.0.1-3","details":"A security vulnerability has been identified in all supported versions\n\nof OpenSSL related to the verification of X.509 certificate chains\nthat include policy constraints.  Attackers may be able to exploit this\nvulnerability by creating a malicious certificate chain that triggers\nexponential use of computational resources, leading to a denial-of-service\n(DoS) attack on affected systems.\n\nPolicy processing is disabled by default but can be enabled by passing\nthe `-policy' argument to the command line utilities or by calling the\n`X509_VERIFY_PARAM_set1_policies()' function.","modified":"2026-04-01T05:12:33.270980Z","published":"2023-03-22T17:15:13Z","upstream":["CVE-2023-0464"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0464"}],"affected":[{"package":{"name":"hvloader","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/hvloader"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.1-3"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-37680.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}