[USN-5402-1] OpenSSL vulnerabilities
Marc Deslauriers
marc.deslauriers at canonical.com
Wed May 4 17:11:51 UTC 2022
==========================================================================
Ubuntu Security Notice USN-5402-1
May 04, 2022
openssl, openssl1.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in OpenSSL.
Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools
- openssl1.0: Secure Socket Layer (SSL) cryptographic library and tools
Details:
Elison Niven discovered that OpenSSL incorrectly handled the c_rehash
script. A local attacker could possibly use this issue to execute arbitrary
commands when c_rehash is run. (CVE-2022-1292)
Raul Metsma discovered that OpenSSL incorrectly verified certain response
signing certificates. A remote attacker could possibly use this issue to
spoof certain response signing certificates. This issue only affected
Ubuntu 22.04 LTS. (CVE-2022-1343)
Tom Colley discovered that OpenSSL used the incorrect MAC key in the
RC4-MD5 ciphersuite. In non-default configurations were RC4-MD5 is enabled,
a remote attacker could possibly use this issue to modify encrypted
communications. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1434)
Aliaksei Levin discovered that OpenSSL incorrectly handled resources when
decoding certificates and keys. A remote attacker could possibly use this
issue to cause OpenSSL to consume resources, leading to a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1473)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
libssl3 3.0.2-0ubuntu1.1
Ubuntu 21.10:
libssl1.1 1.1.1l-1ubuntu1.3
Ubuntu 20.04 LTS:
libssl1.1 1.1.1f-1ubuntu2.13
Ubuntu 18.04 LTS:
libssl1.0.0 1.0.2n-1ubuntu5.9
libssl1.1 1.1.1-1ubuntu2.1~18.04.17
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5402-1
CVE-2022-1292, CVE-2022-1343, CVE-2022-1434, CVE-2022-1473
Package Information:
https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.1
https://launchpad.net/ubuntu/+source/openssl/1.1.1l-1ubuntu1.3
https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.13
https://launchpad.net/ubuntu/+source/openssl/1.1.1-1ubuntu2.1~18.04.17
https://launchpad.net/ubuntu/+source/openssl1.0/1.0.2n-1ubuntu5.9
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20220504/be0e103b/attachment.sig>
More information about the ubuntu-security-announce
mailing list