USN-5845-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5845-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5845-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5845-1
Related
Published
2023-02-07T17:24:19.543953Z
Modified
2023-02-07T17:24:19.543953Z
Summary
openssl1.0 vulnerabilities
Details

David Benjamin discovered that OpenSSL incorrectly handled X.400 address processing. A remote attacker could possibly use this issue to read arbitrary memory contents or cause OpenSSL to crash, resulting in a denial of service. (CVE-2023-0286)

Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly handled streaming ASN.1 data. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-0215)

References

Affected packages

Ubuntu:18.04:LTS / openssl1.0

Package

Name
openssl1.0
Purl
pkg:deb/ubuntu/openssl1.0@1.0.2n-1ubuntu5.11?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2n-1ubuntu5.11

Affected versions

1.*

1.0.2n-1ubuntu2
1.0.2n-1ubuntu3
1.0.2n-1ubuntu4
1.0.2n-1ubuntu5
1.0.2n-1ubuntu5.1
1.0.2n-1ubuntu5.2
1.0.2n-1ubuntu5.3
1.0.2n-1ubuntu5.4
1.0.2n-1ubuntu5.5
1.0.2n-1ubuntu5.6
1.0.2n-1ubuntu5.7
1.0.2n-1ubuntu5.8
1.0.2n-1ubuntu5.9
1.0.2n-1ubuntu5.10

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "libssl1.0.0-dbgsym": "1.0.2n-1ubuntu5.11",
            "libssl1.0-dev": "1.0.2n-1ubuntu5.11",
            "openssl1.0": "1.0.2n-1ubuntu5.11",
            "openssl1.0-dbgsym": "1.0.2n-1ubuntu5.11",
            "libssl1.0.0-udeb": "1.0.2n-1ubuntu5.11",
            "libssl1.0.0": "1.0.2n-1ubuntu5.11",
            "libcrypto1.0.0-udeb": "1.0.2n-1ubuntu5.11"
        }
    ]
}