[USN-5844-1] OpenSSL vulnerabilities
Several security issues were fixed in OpenSSL.
David Benjamin discovered that OpenSSL incorrectly handled X.400 address
processing. A remote attacker could possibly use this issue to read
arbitrary memory contents or cause OpenSSL to crash, resulting in a denial
of service. (CVE-2023-0286)
Corey Bonnell discovered that OpenSSL incorrectly handled X.509 certificate
verification. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4203)
Hubert Kario discovered that OpenSSL had a timing based side channel in the
OpenSSL RSA Decryption implementation. A remote attacker could possibly use
this issue to recover sensitive information. (CVE-2022-4304)
Dawei Wang discovered that OpenSSL incorrectly handled parsing certain PEM
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. (CVE-2022-4450)
Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly
handled streaming ASN.1 data. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-0215)
Marc Schönefeld discovered that OpenSSL incorrectly handled malformed PKCS7
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2023-0216)
Kurt Roeckx discovered that OpenSSL incorrectly handled validating certain
DSA public keys. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0217)
Hubert Kario and Dmitry Belyavsky discovered that OpenSSL incorrectly
validated certain signatures. A remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0401)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/openssl?distro=kinetic | < 3.0.5-2ubuntu2.1 |
pkg:deb/ubuntu/openssl?distro=jammy | < 3.0.2-0ubuntu1.8 |
pkg:deb/ubuntu/openssl?distro=focal | < 1.1.1f-1ubuntu2.17 |
pkg:deb/ubuntu/openssl?distro=bionic | < 1.1.1-1ubuntu2.1~18.04.21 |
pkg:deb/ubuntu/libssl3?distro=kinetic | < 3.0.5-2ubuntu2.1 |
pkg:deb/ubuntu/libssl3?distro=jammy | < 3.0.2-0ubuntu1.8 |
pkg:deb/ubuntu/libssl1.1?distro=focal | < 1.1.1f-1ubuntu2.17 |
pkg:deb/ubuntu/libssl1.1?distro=bionic | < 1.1.1-1ubuntu2.1~18.04.21 |
pkg:deb/ubuntu/libssl-doc?distro=kinetic | < 3.0.5-2ubuntu2.1 |
pkg:deb/ubuntu/libssl-doc?distro=jammy | < 3.0.2-0ubuntu1.8 |
pkg:deb/ubuntu/libssl-doc?distro=focal | < 1.1.1f-1ubuntu2.17 |
pkg:deb/ubuntu/libssl-doc?distro=bionic | < 1.1.1-1ubuntu2.1~18.04.21 |
pkg:deb/ubuntu/libssl-dev?distro=kinetic | < 3.0.5-2ubuntu2.1 |
pkg:deb/ubuntu/libssl-dev?distro=jammy | < 3.0.2-0ubuntu1.8 |
pkg:deb/ubuntu/libssl-dev?distro=focal | < 1.1.1f-1ubuntu2.17 |
pkg:deb/ubuntu/libssl-dev?distro=bionic | < 1.1.1-1ubuntu2.1~18.04.21 |
- ID
- USN-5844-1
- Severity
- high
- Severity from
- CVE-2022-4450
- URL
- https://ubuntu.com/security/notices/USN-5844-1
- Published
-
2023-02-07T17:20:39
(19 months ago) - Modified
-
2023-02-07T17:20:39
(19 months ago) - Other Advisories
-
- ALAS-2023-1683
- ALAS2-2023-1934
- ALAS2-2023-1935
- ALAS2-2024-2502
- ALPINE:CVE-2022-4203
- ALPINE:CVE-2022-4304
- ALPINE:CVE-2022-4450
- ALPINE:CVE-2023-0215
- ALPINE:CVE-2023-0216
- ALPINE:CVE-2023-0217
- ALPINE:CVE-2023-0286
- ALPINE:CVE-2023-0401
- ALSA-2023:0946
- ALSA-2023:1405
- ALSA-2023:2165
- ALSA-2023:2932
- DSA-5343-1
- ELSA-2023-0946
- ELSA-2023-12152
- ELSA-2023-12205
- ELSA-2023-12210
- ELSA-2023-12213
- ELSA-2023-12297
- ELSA-2023-12326
- ELSA-2023-13024
- ELSA-2023-13025
- ELSA-2023-13026
- ELSA-2023-13027
- ELSA-2023-1335
- ELSA-2023-1405
- ELSA-2023-2165
- ELSA-2023-2932
- ELSA-2023-32790
- ELSA-2023-32791
- FEDORA-2023-57f33242bc
- FEDORA-2023-a5564c0a3f
- FEDORA-2023-e1ffb79ddf
- FEDORA-2023-e821b64a4c
- FREEBSD:648A432C-A71F-11ED-86E9-D4C9EF517024
- FREEBSD:C1A8ED1C-2814-4260-82AA-9E37C83AAC93
- FREEBSD:C8EB4C40-47BD-11EE-8E38-002590C1F29C
- FREEBSD:D86BECFE-05A4-11EE-9D4A-080027EDA32C
- GLSA-202402-08
- RHSA-2023:0946
- RHSA-2023:1335
- RHSA-2023:1405
- RHSA-2023:2165
- RHSA-2023:2932
- RLSA-2023:0946
- RLSA-2023:1405
- RUSTSEC-2023-0006
- RUSTSEC-2023-0007
- RUSTSEC-2023-0008
- RUSTSEC-2023-0009
- RUSTSEC-2023-0010
- RUSTSEC-2023-0011
- RUSTSEC-2023-0012
- RUSTSEC-2023-0013
- SSA:2023-038-01
- SUSE-SU-2023:0305-1
- SUSE-SU-2023:0305-2
- SUSE-SU-2023:0306-1
- SUSE-SU-2023:0307-1
- SUSE-SU-2023:0308-1
- SUSE-SU-2023:0309-1
- SUSE-SU-2023:0310-1
- SUSE-SU-2023:0311-1
- SUSE-SU-2023:0312-1
- SUSE-SU-2023:0482-1
- SUSE-SU-2023:0581-1
- SUSE-SU-2023:0584-1
- SUSE-SU-2023:0684-1
- SUSE-SU-2023:2622-1
- SUSE-SU-2023:2623-1
- SUSE-SU-2023:2624-1
- SUSE-SU-2023:2633-1
- SUSE-SU-2023:2634-1
- SUSE-SU-2023:2648-1
- SUSE-SU-2023:3096-1
- SUSE-SU-2023:3179-1
- USN-5845-1
- USN-5845-2
- USN-6564-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/openssl?distro=kinetic | ubuntu | openssl | < 3.0.5-2ubuntu2.1 | kinetic | ||
Affected | pkg:deb/ubuntu/openssl?distro=jammy | ubuntu | openssl | < 3.0.2-0ubuntu1.8 | jammy | ||
Affected | pkg:deb/ubuntu/openssl?distro=focal | ubuntu | openssl | < 1.1.1f-1ubuntu2.17 | focal | ||
Affected | pkg:deb/ubuntu/openssl?distro=bionic | ubuntu | openssl | < 1.1.1-1ubuntu2.1~18.04.21 | bionic | ||
Affected | pkg:deb/ubuntu/libssl3?distro=kinetic | ubuntu | libssl3 | < 3.0.5-2ubuntu2.1 | kinetic | ||
Affected | pkg:deb/ubuntu/libssl3?distro=jammy | ubuntu | libssl3 | < 3.0.2-0ubuntu1.8 | jammy | ||
Affected | pkg:deb/ubuntu/libssl1.1?distro=focal | ubuntu | libssl1.1 | < 1.1.1f-1ubuntu2.17 | focal | ||
Affected | pkg:deb/ubuntu/libssl1.1?distro=bionic | ubuntu | libssl1.1 | < 1.1.1-1ubuntu2.1~18.04.21 | bionic | ||
Affected | pkg:deb/ubuntu/libssl-doc?distro=kinetic | ubuntu | libssl-doc | < 3.0.5-2ubuntu2.1 | kinetic | ||
Affected | pkg:deb/ubuntu/libssl-doc?distro=jammy | ubuntu | libssl-doc | < 3.0.2-0ubuntu1.8 | jammy | ||
Affected | pkg:deb/ubuntu/libssl-doc?distro=focal | ubuntu | libssl-doc | < 1.1.1f-1ubuntu2.17 | focal | ||
Affected | pkg:deb/ubuntu/libssl-doc?distro=bionic | ubuntu | libssl-doc | < 1.1.1-1ubuntu2.1~18.04.21 | bionic | ||
Affected | pkg:deb/ubuntu/libssl-dev?distro=kinetic | ubuntu | libssl-dev | < 3.0.5-2ubuntu2.1 | kinetic | ||
Affected | pkg:deb/ubuntu/libssl-dev?distro=jammy | ubuntu | libssl-dev | < 3.0.2-0ubuntu1.8 | jammy | ||
Affected | pkg:deb/ubuntu/libssl-dev?distro=focal | ubuntu | libssl-dev | < 1.1.1f-1ubuntu2.17 | focal | ||
Affected | pkg:deb/ubuntu/libssl-dev?distro=bionic | ubuntu | libssl-dev | < 1.1.1-1ubuntu2.1~18.04.21 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |