USN-5844-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5844-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5844-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5844-1
Related
Published
2023-02-07T17:20:39.900112Z
Modified
2023-02-07T17:20:39.900112Z
Summary
openssl vulnerabilities
Details

David Benjamin discovered that OpenSSL incorrectly handled X.400 address processing. A remote attacker could possibly use this issue to read arbitrary memory contents or cause OpenSSL to crash, resulting in a denial of service. (CVE-2023-0286)

Corey Bonnell discovered that OpenSSL incorrectly handled X.509 certificate verification. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4203)

Hubert Kario discovered that OpenSSL had a timing based side channel in the OpenSSL RSA Decryption implementation. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2022-4304)

Dawei Wang discovered that OpenSSL incorrectly handled parsing certain PEM data. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2022-4450)

Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly handled streaming ASN.1 data. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-0215)

Marc Schönefeld discovered that OpenSSL incorrectly handled malformed PKCS7 data. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0216)

Kurt Roeckx discovered that OpenSSL incorrectly handled validating certain DSA public keys. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0217)

Hubert Kario and Dmitry Belyavsky discovered that OpenSSL incorrectly validated certain signatures. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0401)

References

Affected packages

Ubuntu:18.04:LTS / openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@1.1.1-1ubuntu2.1~18.04.21?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1-1ubuntu2.1~18.04.21

Affected versions

1.*

1.0.2g-1ubuntu13
1.0.2g-1ubuntu14
1.0.2n-1ubuntu1
1.1.0g-2ubuntu1
1.1.0g-2ubuntu2
1.1.0g-2ubuntu3
1.1.0g-2ubuntu4
1.1.0g-2ubuntu4.1
1.1.0g-2ubuntu4.3
1.1.1-1ubuntu2.1~18.04.1
1.1.1-1ubuntu2.1~18.04.2
1.1.1-1ubuntu2.1~18.04.3
1.1.1-1ubuntu2.1~18.04.4
1.1.1-1ubuntu2.1~18.04.5
1.1.1-1ubuntu2.1~18.04.6
1.1.1-1ubuntu2.1~18.04.7
1.1.1-1ubuntu2.1~18.04.8
1.1.1-1ubuntu2.1~18.04.9
1.1.1-1ubuntu2.1~18.04.10
1.1.1-1ubuntu2.1~18.04.13
1.1.1-1ubuntu2.1~18.04.14
1.1.1-1ubuntu2.1~18.04.15
1.1.1-1ubuntu2.1~18.04.17
1.1.1-1ubuntu2.1~18.04.19
1.1.1-1ubuntu2.1~18.04.20

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libssl-doc": "1.1.1-1ubuntu2.1~18.04.21",
            "libssl-dev": "1.1.1-1ubuntu2.1~18.04.21",
            "libssl1.1-dbgsym": "1.1.1-1ubuntu2.1~18.04.21",
            "libssl1.1-udeb": "1.1.1-1ubuntu2.1~18.04.21",
            "libssl1.1": "1.1.1-1ubuntu2.1~18.04.21",
            "openssl-dbgsym": "1.1.1-1ubuntu2.1~18.04.21",
            "libcrypto1.1-udeb": "1.1.1-1ubuntu2.1~18.04.21",
            "openssl": "1.1.1-1ubuntu2.1~18.04.21"
        }
    ]
}

Ubuntu:20.04:LTS / openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@1.1.1f-1ubuntu2.17?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.1f-1ubuntu2.17

Affected versions

1.*

1.1.1c-1ubuntu4
1.1.1d-2ubuntu3
1.1.1d-2ubuntu6
1.1.1f-1ubuntu1
1.1.1f-1ubuntu2
1.1.1f-1ubuntu2.1
1.1.1f-1ubuntu2.2
1.1.1f-1ubuntu2.3
1.1.1f-1ubuntu2.4
1.1.1f-1ubuntu2.5
1.1.1f-1ubuntu2.8
1.1.1f-1ubuntu2.9
1.1.1f-1ubuntu2.10
1.1.1f-1ubuntu2.11
1.1.1f-1ubuntu2.12
1.1.1f-1ubuntu2.13
1.1.1f-1ubuntu2.15
1.1.1f-1ubuntu2.16

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libssl-doc": "1.1.1f-1ubuntu2.17",
            "libssl-dev": "1.1.1f-1ubuntu2.17",
            "libssl1.1-dbgsym": "1.1.1f-1ubuntu2.17",
            "libssl1.1-udeb": "1.1.1f-1ubuntu2.17",
            "libssl1.1": "1.1.1f-1ubuntu2.17",
            "openssl-dbgsym": "1.1.1f-1ubuntu2.17",
            "libcrypto1.1-udeb": "1.1.1f-1ubuntu2.17",
            "openssl": "1.1.1f-1ubuntu2.17"
        }
    ]
}

Ubuntu:22.04:LTS / openssl

Package

Name
openssl
Purl
pkg:deb/ubuntu/openssl@3.0.2-0ubuntu1.8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.2-0ubuntu1.8

Affected versions

1.*

1.1.1l-1ubuntu1

3.*

3.0.0-1ubuntu1
3.0.1-0ubuntu1
3.0.2-0ubuntu1
3.0.2-0ubuntu1.1
3.0.2-0ubuntu1.2
3.0.2-0ubuntu1.4
3.0.2-0ubuntu1.5
3.0.2-0ubuntu1.6
3.0.2-0ubuntu1.7

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libssl3": "3.0.2-0ubuntu1.8",
            "libssl-dev": "3.0.2-0ubuntu1.8",
            "openssl-dbgsym": "3.0.2-0ubuntu1.8",
            "openssl": "3.0.2-0ubuntu1.8",
            "libssl-doc": "3.0.2-0ubuntu1.8",
            "libssl3-dbgsym": "3.0.2-0ubuntu1.8"
        }
    ]
}