关键信息 CVE-2023-3446 Issue Summary - Checking excessively long DH keys or parameters may be very slow. Severity - Low Impact Summary - Applications that use , , or to check a DH key or DH parameters may experience long delays. If the keys or parameters are from an untrusted source, this may lead to a Denial of Service. Affected Functions - - - Additional Vulnerable Applications - OpenSSL and command line applications when using the option. Not Affected - OpenSSL SSL/TLS implementation - OpenSSL 3.0 and 3.1 FIPS providers Vulnerable Versions - OpenSSL 3.1, 3.0, 1.1.1, and 1.0.2 Timeline - Fix will be included in the next releases for affected versions. - Fix available in specific commits for 3.1 ( ), 3.0 ( ), and 1.1.1 ( ). Detection and Reporting - Detected by OSSfuzz and reported on 25th June 2023. - Fix developed by Matt Caswell.