First published: Wed May 17 2023(Updated: )
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2207947 is classified as a potential performance issue that can lead to application slowdowns.
To fix REDHAT-BUG-2207947, it is recommended to update to the latest version of OpenSSL that includes performance improvements.
Applications that directly use OBJ_obj2txt() or OpenSSL subsystems such as OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit are affected.
REDHAT-BUG-2207947 can cause significant delays in processing ASN.1 object identifiers, impacting application performance.
Currently, a specific workaround for REDHAT-BUG-2207947 has not been provided, but updating OpenSSL is advised.