Ubuntu 5710-1: OpenSSL vulnerabilities | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5710-1
November 01, 2022

openssl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

It was discovered that OpenSSL incorrectly handled certain X.509 Email
Addresses. If a certificate authority were tricked into signing a
specially-crafted certificate, a remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. The
default compiler options for affected releases reduce the vulnerability to
a denial of service. (CVE-2022-3602, CVE-2022-3786)

It was discovered that OpenSSL incorrectly handled applications creating
custom ciphers via the legacy EVP_CIPHER_meth_new() function. This issue
could cause certain applications that mishandled values to the function to
possibly end up with a NULL cipher and messages in plaintext.
(CVE-2022-3358)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
   libssl3                         3.0.5-2ubuntu2

Ubuntu 22.04 LTS:
   libssl3                         3.0.2-0ubuntu1.7

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5710-1
   CVE-2022-3358, CVE-2022-3602, CVE-2022-3786

Package Information:
   https://launchpad.net/ubuntu/+source/openssl/3.0.5-2ubuntu2
   https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.7

Ubuntu 5710-1: OpenSSL vulnerabilities

November 1, 2022

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS Summary: Several security issues were fixed in OpenSSL. Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools Details: It was discovered that OpenSSL incorrectly handled certain X.509 Email Addresses. If a certificate authority were tricked into signing a specially-crafted certificate, a remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. The default compiler options for affected releases reduce the vulnerability to a denial of service. (CVE-2022-3602, CVE-2022-3786) It was discovered that OpenSSL incorrectly handled applications creating custom ciphers via the legacy EVP_CIPHER_meth_new() function. This issue could cause certain applications that mishandled values to the function to possibly end up with a NULL cipher and messages in plaintext. (CVE-2022-3358)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: libssl3 3.0.5-2ubuntu2 Ubuntu 22.04 LTS: libssl3 3.0.2-0ubuntu1.7 After a standard system update you need to reboot your computer to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5710-1

CVE-2022-3358, CVE-2022-3602, CVE-2022-3786

Severity
Ubuntu Security Notice USN-5710-1

Package Information

https://launchpad.net/ubuntu/+source/openssl/3.0.5-2ubuntu2 https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.7

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.