[USN-5710-1] OpenSSL vulnerabilities

Severity High
Affected Packages 8
CVEs 3

Several security issues were fixed in OpenSSL.

It was discovered that OpenSSL incorrectly handled certain X.509 Email
Addresses. If a certificate authority were tricked into signing a
specially-crafted certificate, a remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. The
default compiler options for affected releases reduce the vulnerability to
a denial of service. (CVE-2022-3602, CVE-2022-3786)

It was discovered that OpenSSL incorrectly handled applications creating
custom ciphers via the legacy EVP_CIPHER_meth_new() function. This issue
could cause certain applications that mishandled values to the function to
possibly end up with a NULL cipher and messages in plaintext.
(CVE-2022-3358)

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/openssl?distro=kinetic ubuntu openssl < 3.0.5-2ubuntu2 kinetic
Affected pkg:deb/ubuntu/openssl?distro=jammy ubuntu openssl < 3.0.2-0ubuntu1.7 jammy
Affected pkg:deb/ubuntu/libssl3?distro=kinetic ubuntu libssl3 < 3.0.5-2ubuntu2 kinetic
Affected pkg:deb/ubuntu/libssl3?distro=jammy ubuntu libssl3 < 3.0.2-0ubuntu1.7 jammy
Affected pkg:deb/ubuntu/libssl-doc?distro=kinetic ubuntu libssl-doc < 3.0.5-2ubuntu2 kinetic
Affected pkg:deb/ubuntu/libssl-doc?distro=jammy ubuntu libssl-doc < 3.0.2-0ubuntu1.7 jammy
Affected pkg:deb/ubuntu/libssl-dev?distro=kinetic ubuntu libssl-dev < 3.0.5-2ubuntu2 kinetic
Affected pkg:deb/ubuntu/libssl-dev?distro=jammy ubuntu libssl-dev < 3.0.2-0ubuntu1.7 jammy
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...